The Latest in IT Security

1

The vulnerabilities exploited in the attack were reported to Tesla in mid-August and they were patched recently by the electric car maker with an over-the-air update (version 2020.48) that is currently being rolled out to vehicles. The attack method identified by the COSIC researchers targets the Tesla Model X key fob, which uses Bluetooth Low […]

Read more ...

1

The Swedish telecom regulator said Tuesday that four wireless carriers bidding for frequencies in an upcoming spectrum auction for the new 5G networks must not use equipment from Huawei or ZTE. Wireless carriers that plan to use existing telecommunications infrastructure for 5G networks must also rip out any existing gear from Huawei or ZTE, the […]

Read more ...

1

“I wouldn’t say there would be retaliation, but there would be consequences” if Brazil goes against US advice and picks the Chinese firm, Ambassador Todd Chapman told newspaper Globo. Brazil is due to launch a tender next year for the project to develop the next generation of telecommunications technology in Latin America’s most populous country, […]

Read more ...


Categories

SUNDAY, MAY 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments