Many cybersecurity issues are affecting 5G. In this article, we will be focusing on the 3 most severe ones – latency, passive eavesdropping and user impersonation.
5G networks provide lots of benefits and also unknown security risks. Organizations need to change their threat models to increase visibility, security awareness and control of the endpoints.
Top Chinese telecom operators have jointly introduced a new 5G messaging service based on the GSMA RCS standard that seeks to replace WeChat, the popular Chinese messaging app.
White House Unveils National Strategy for 5G Security Concurrently With Signing of the Secure 5G Act
The Trump Administration has released a national strategy for 5G security that will guide the government's approach to securing 5G networks, fulfilling the mandate of the Secure 5G and Beyond Act which was signed concurrently.
Reasonable security is required for 5G IoT devices under new California and Oregon IoT security laws but it’s up to manufacturers to interpret the requirements and develop standards.
China Mobile’s growth in 5G subscribers has been consistent. The company has gone from 2.55 million subscribers In Dec 2019 to 6.74 million in Jan 2020, and hopes to reach 70 million 5G subscribers by the end of 2020.
5G networks are exciting and open the door to many new possibilities for IoT, however it also comes with security risks as manufacturers rush to dominate the new untapped market their devices.
France Authorizes the Use of Huawei Equipment in Its 5G Network While Plans for a New Factory Are Underway
According to anonymous sources, the French authorities have decided to approve the use of Huawei equipment but only in non-core parts of the 5G network.
Report Shows 5G Technology Is Live in 24 Mobile Markets; Future Coverage to Reach 20% of Global Connections by 2025
Report by the GSM Association shows that 5G has gained significant traction and 46 mobile operators is offering the service in 24 mobile markets.
U.S. officials claimed that Huawei can gain backdoor access by exploiting the same equipment network operators were required to install for use by law enforcement agencies.