<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Gizmochina</title>
	<atom:link href="https://www.gizmochina.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.gizmochina.com/tag/cybersecurity/</link>
	<description>Latest Tech News, Product Reviews and Deals</description>
	<lastBuildDate>Tue, 23 Jan 2024 00:54:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.9</generator>
	<item>
		<title>Microsoft&#8217;s Cyber Secrets at Risk, The Strontium Cyber Threat Unmasked</title>
		<link>https://www.gizmochina.com/2024/01/22/microsoft-faced-cyberattack-from-russian-hackers/</link>
		
		<dc:creator><![CDATA[Oğuz Çakır]]></dc:creator>
		<pubDate>Mon, 22 Jan 2024 14:35:54 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=599731</guid>

					<description><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-300x169.webp?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Microsoft" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-747x420.webp 747w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft.webp 1200w" sizes="(max-width: 300px) 100vw, 300px" /><p>We live in a digital age where every piece of information we have is on the internet. This applies to a wide range of topics, from personal data to state secrets. To avoid losing such information, we store it in the cloud on servers provided by technology giants like Google, Microsoft, and Apple. However, how [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2024/01/22/microsoft-faced-cyberattack-from-russian-hackers/">Microsoft&#8217;s Cyber Secrets at Risk, The Strontium Cyber Threat Unmasked</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-300x169.webp?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Microsoft" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-747x420.webp 747w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft.webp 1200w" sizes="(max-width: 300px) 100vw, 300px" />
<p>We live in a digital age where every piece of information we have is on the internet. This applies to a wide range of topics, from personal data to state secrets. To avoid losing such information, we store it in the cloud on servers provided by technology giants like Google, Microsoft, and Apple. However, how successful are the companies we trust to store and protect this information? For instance, in 2014, Apple failed to secure iCloud, leading to the leakage of celebrities&#8217; nude photos. Now, Microsoft reports being targeted by Russian hackers seeking its secrets. Here are the details&#8230;</p>



<h2><strong>Microsoft&#8217;s Encounter with Russian Cyberattack Espionage on its Secrets</strong></h2>



<p>Microsoft recently revealed a cyberattack by Russian hackers trying to uncover the company&#8217;s secrets. Though not a recent event, tech companies usually keep such incidents under wraps until the vulnerabilities are fixed. This particular attack occurred in late 2023, focusing on Microsoft&#8217;s email, cloud storage, and various products. The group responsible for the attack is known as &#8220;Strontium.&#8221;</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="576" src="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1024x576.webp?x10805" alt="Microsoft" class="wp-image-559426" srcset="https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft-747x420.webp 747w, https://www.gizmochina.com/wp-content/uploads/2023/08/Microsoft.webp 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The group had previously attempted cyberattacks on Microsoft and other major tech companies. Microsoft reported that the attack was unsuccessful, with no significant information compromised. However, the company stressed the importance of bolstering security measures and preparing for future attacks. According to their statement, during the initial stage of the attack, the Strontium group managed to install malicious software on Microsoft&#8217;s email servers.</p>



<p>Malicious software attempted to get users&#8217; passwords and sensitive information. In the second phase, the Strontium group tried to access Microsoft&#8217;s cloud storage services to reach critical data. Thankfully, Microsoft&#8217;s security measures stopped Strontium from succeeding. The company promptly responded, detecting and removing the malicious software to protect the data.</p>



<p>Microsoft has linked the cyberattack to a Russian hacker group and urged the U.S. Department of Justice to investigate. The DOJ has started the investigation, labeling the Strontium group as an &#8220;international criminal organization.&#8221; This attack prompted Microsoft to assess and bolster its security measures, with increased investments in improved protocols and cybersecurity training for employees. The company is dedicated to further boosting cybersecurity investments to stay ready for future threats.</p>



<p><strong>RELATED:</strong></p>



<ul><li><a href="https://www.gizmochina.com/2024/01/09/get-redmi-k70-pro-for-discounted-price-of-499-at-giztop/" target="_blank" rel="noreferrer noopener">Get Redmi K70 Pro for discounted price of $499</a></li><li><a href="https://www.gizmochina.com/2023/12/27/get-30-discount-on-aoostar-wtr-r1-n100-mini-pc-at-geekwills/" target="_blank" rel="noreferrer noopener">Big Discount: AOOSTAR R1 N100 NAS Mini PC Only For $159</a></li><li><a href="https://www.gizmochina.com/2023/11/07/get-100-off-on-lenovo-legion-y700-2023-gamin-tablet-at-giztop/" target="_blank" rel="noreferrer noopener">Lenovo Legion Y700 2023: Save $100 on this 8-inch gaming Android tablet</a></li><li><a href="https://www.gizmochina.com/2024/01/10/oneplus-12-partners-with-pixelworks/" target="_blank" rel="noreferrer noopener">OnePlus partners with Pixelworks to Elevate Mobile Gaming Experience on the OnePlus 12</a></li></ul>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Nubia Z60 Ultra Full Review: The best curtain call of 2023" width="696" height="392" src="https://www.youtube.com/embed/ldGwOU5CgkI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2024/01/22/microsoft-faced-cyberattack-from-russian-hackers/">Microsoft&#8217;s Cyber Secrets at Risk, The Strontium Cyber Threat Unmasked</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Linux was Being Infiltrated by Malware for 3 Years Without Raising any Alarms</title>
		<link>https://www.gizmochina.com/2023/09/14/unnoticed-linux-malware-campaign-highlights/</link>
		
		<dc:creator><![CDATA[Anubhav]]></dc:creator>
		<pubDate>Thu, 14 Sep 2023 04:44:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=566540</guid>

					<description><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-300x169.webp?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Apple M1 Linux" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1536x864.webp 1536w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-2048x1152.webp 2048w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1920x1080.webp 1920w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-747x420.webp 747w" sizes="(max-width: 300px) 100vw, 300px" /><p>A hidden malware operation has infiltrated the Linux community for a solid three years without raising alarms, says Kaspersky, a Russian cybersecurity firm. Despite Linux being hailed as a secure alternative to mainstream operating systems like Windows and macOS, it appears even the cybersecurity experts missed this one. This quiet attack particularly exploited a so-called [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2023/09/14/unnoticed-linux-malware-campaign-highlights/">Linux was Being Infiltrated by Malware for 3 Years Without Raising any Alarms</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-300x169.webp?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Apple M1 Linux" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1536x864.webp 1536w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-2048x1152.webp 2048w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1920x1080.webp 1920w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-747x420.webp 747w" sizes="(max-width: 300px) 100vw, 300px" />
<p>A hidden malware operation has infiltrated the <a href="http://linux">Linux</a> community for a solid three years without raising alarms, says Kaspersky, a Russian cybersecurity firm. Despite Linux being hailed as a secure alternative to mainstream operating systems like <a href="http://gizmochina.com/tag/windows">Windows</a> and<a href="http://gizmochina.com/tag/macos"> macOS</a>, it appears even the cybersecurity experts missed this one.</p>



<p>This quiet attack particularly exploited a so-called free download manager designed for Debian users. What&#8217;s unusual? This software was laced with malicious code way back since January 2020. It contained a hidden post-installation script that set off the malware, complete with comments in both Russian and Ukrainian.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="576" src="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1024x576.webp?x10805" alt="Apple M1 Linux" class="wp-image-517055" srcset="https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1024x576.webp 1024w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-300x169.webp 300w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-768x432.webp 768w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1536x864.webp 1536w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-2048x1152.webp 2048w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-696x392.webp 696w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1068x601.webp 1068w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-1920x1080.webp 1920w, https://www.gizmochina.com/wp-content/uploads/2023/02/linux-6-2-offers-game-changing-support-for-apple-m1-powered-macs-2-747x420.webp 747w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>Kaspersky’s investigation further revealed that once installed, the software acted as a Bash stealer, collecting sensitive data from the system. This includes saved passwords, browsing history, and even credentials for high-profile cloud services like AWS and Google Cloud.</p>



<p>Interestingly, the malware wasn&#8217;t distributed through the official website of the download manager but had been subtly posted on forums like Reddit and StackOverflow over two years. This crafty move allowed the malware to stay under the radar, essentially weaponizing the community&#8217;s trust.</p>



<p>The real kicker is the reason behind targeting Linux systems: they&#8217;re simply overlooked. According to Kaspersky, the actors exploited the fact that Linux machines don&#8217;t get as much scrutiny as their Windows and macOS counterparts.</p>



<p>While the genuine makers of the Free Download Manager remain tight-lipped, this incident should serve as a wake-up call. Being security savvy isn&#8217;t just for Windows or Mac users. The first step in safeguarding your system is sticking to verified download sources. Had users double-checked where they were downloading from, they would have dodged this malware bullet.</p>



<p>In an age where Linux is gaining popularity, it’s time the community revisits its assumptions about its in-built security. If even the experts missed this, what else is lurking in the corners of the Linux world?</p>



<p><strong><span style="text-decoration: underline">RELATED:</span></strong></p>



<ul><li><a href="https://www.gizmochina.com/2017/10/19/samsungs-linux-galaxy-arriving-soon-seamless-linux-os-access-dex/">Samsung’s Linux on Galaxy Arriving Soon for Seamless Linux OS Access Through DeX</a></li><li><a href="https://www.gizmochina.com/2023/06/14/zte-executive-elected-chairman-linux-foundation-ai-data-foundation-governing-board/">ZTE executive elected as chairman of Linux Foundation AI and Data Foundation governing board</a></li><li><a href="https://www.gizmochina.com/guides/download-best-gcam-for-vivo-v27-pro/">Download the Best GCam APK for Vivo V27 Pro</a></li></ul>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="OnePlus 11R vs Realme GT Neo5 Comparison: The Loser Is Someone Else" width="696" height="392" src="https://www.youtube.com/embed/JKcXDNY6DVY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>



<p>(Via)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2023/09/14/unnoticed-linux-malware-campaign-highlights/">Linux was Being Infiltrated by Malware for 3 Years Without Raising any Alarms</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Samsung Fixes 62 Security Holes: Why This Update Is a Win for User Privacy?</title>
		<link>https://www.gizmochina.com/2023/09/12/samsung-fixes-security-issues-privacy/</link>
		
		<dc:creator><![CDATA[Anubhav]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 02:44:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Update]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=565843</guid>

					<description><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Samsung Galaxy Z Fold 5 and Galaxy Z Flip 5" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1536x1024.jpg 1536w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-2048x1365.jpg 2048w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1920x1280.jpg 1920w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-630x420.jpg 630w" sizes="(max-width: 300px) 100vw, 300px" /><p>In the ever-changing landscape of cybersecurity, the tech giant Samsung has taken a leap forward by rolling out its September Android security update in the U.S. Covering both the Galaxy S23 and S22 series, the update brings much more than a performance tweak—it plugs a whopping 62 security vulnerabilities. The company aims to avoid any [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2023/09/12/samsung-fixes-security-issues-privacy/">Samsung Fixes 62 Security Holes: Why This Update Is a Win for User Privacy?</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Samsung Galaxy Z Fold 5 and Galaxy Z Flip 5" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1536x1024.jpg 1536w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-2048x1365.jpg 2048w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1920x1280.jpg 1920w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-630x420.jpg 630w" sizes="(max-width: 300px) 100vw, 300px" />
<p>In the ever-changing landscape of <a href="http://gizmochina.com/tag/cybersecurity">cybersecurity</a>, the tech giant <a href="http://gizmochina.com/category/samsung">Samsung </a>has taken a leap forward by rolling out its September <a href="http://gizmochina.com/tag/android">Android </a>security update in the U.S. Covering both the <a href="http://gizmochina.com/tag/galaxy-s23">Galaxy S23</a> and <a href="http://gizmochina.com/tag/galaxy-s22">S22 </a>series, the update brings much more than a performance tweak—it plugs a whopping 62 security vulnerabilities.</p>



<h3>The company aims to avoid any future privacy breaches</h3>



<p>The update initially rolled out to Verizon customers, eventually spreading to other major U.S. wireless carriers. A significant part of the repair comes from Samsung itself, which contributed 35 patches. These targeted a range of vulnerabilities across its ecosystem, including the Samsung Keyboard app and Samsung <a href="http://gizmochina.com/tag/knox">Knox </a>AI, among others. Google chipped in with 19 patches, four of which are considered &#8216;critical.&#8217;</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="683" src="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1024x683.jpg?x10805" alt="Samsung Galaxy Z Fold 5 and Galaxy Z Flip 5" class="wp-image-564912" srcset="https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1536x1024.jpg 1536w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-2048x1365.jpg 2048w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-1920x1280.jpg 1920w, https://www.gizmochina.com/wp-content/uploads/2023/09/Samsung-Galaxy-Z-Fold-5-and-Galaxy-Z-Flip-5-630x420.jpg 630w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>Samsung’s move stands out because it demonstrates a new industry standard in smartphone cybersecurity. More than just focusing on flashy features or sleek designs, the company is putting a spotlight on user privacy. The patches address vulnerabilities that could potentially give attackers unauthorized access to personal data. The average user might not realize the importance of such updates, but neglecting them could be a serious gamble with your privacy.</p>



<p>Internationally, the September update reaches far and wide. Canadian owners of the mid-range <a href="http://gizmochina.com/tag/samsung-galaxy-s23">Galaxy A52</a> have started receiving the update across several carriers. Even the rugged Galaxy Xcover 5 isn’t left out; it&#8217;s getting updated in Mexico, Guatemala, and Argentina.</p>



<p>For anyone reluctant about pressing that &#8220;Update Now&#8221; button, this isn&#8217;t a software update you want to snooze on. So take a moment and go to Settings &gt; Software update &gt; Download and install. Your privacy is worth it. Keeping your device updated isn&#8217;t just about enjoying new features; it’s an essential aspect of digital well-being. Samsung’s broad and thorough September security update is a step forward in setting a new gold standard for smartphone security.</p>



<p><strong><span style="text-decoration: underline">RELATED:</span></strong></p>



<ul><li><a href="https://www.gizmochina.com/2023/09/11/samsung-galaxy-smart-tag-2-and-galaxy-buds-fe-appear-on-uaes-tdra/">Samsung Galaxy Smart Tag 2 and Galaxy Buds FE appear on UAE’s TDRA</a></li><li><a href="https://www.gizmochina.com/2023/09/09/samsung-releases-one-ui-6-beta-for-galaxy-a54/">Samsung releases One UI 6 beta for Galaxy A54</a></li><li><a href="https://www.gizmochina.com/guides/best-1440p-monitors-2023/">Best 1440p Monitors 2023 – Dell, Asus, LG, &amp; More</a></li></ul>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Sharge ICEMAG Power Bank Review: Magnetic Wireless Charge With Active Fan?!" width="696" height="392" src="https://www.youtube.com/embed/5TwJrOUTOJg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>



<p>(<a href="https://www.phonearena.com/news/much-needed-security-update-us-galaxy-s23-s-22_id150578">Via</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2023/09/12/samsung-fixes-security-issues-privacy/">Samsung Fixes 62 Security Holes: Why This Update Is a Win for User Privacy?</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Manager LastPass Confirms They Were Hacked This Month</title>
		<link>https://www.gizmochina.com/2022/08/26/password-manager-lastpass-hacked-august/</link>
		
		<dc:creator><![CDATA[Leo Wong De Quan]]></dc:creator>
		<pubDate>Fri, 26 Aug 2022 02:46:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=481935</guid>

					<description><![CDATA[<img width="300" height="163" src="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1-300x163.png?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="LastPass Image 1" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1-300x163.png 300w, https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1.png 600w" sizes="(max-width: 300px) 100vw, 300px" /><p>With more and more websites setting restrictions on the passwords you can use (ie it must have a capital letter, a unique symbol or your password must be 12 characters long), password managers such as Dashlane, KeePass, and 1Password have been gaining attraction among online users over the past 5 years. One among the popular [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/08/26/password-manager-lastpass-hacked-august/">Password Manager LastPass Confirms They Were Hacked This Month</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="163" src="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1-300x163.png?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="LastPass Image 1" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1-300x163.png 300w, https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1.png 600w" sizes="(max-width: 300px) 100vw, 300px" /><p><span style="font-weight: 400">With more and more websites setting restrictions on the passwords you can use (ie it must have a capital letter, a unique symbol or your password must be 12 characters long), password managers such as Dashlane, KeePass, and 1Password have been gaining attraction among online users over the past 5 years.</span></p>
<p><span style="font-weight: 400">One among the popular password managers, LastPass, reported in their </span><a href="https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/"><span style="font-weight: 400">official community blog post</span></a><span style="font-weight: 400">, that unfortunately their service was hacked this August 2022.</span></p>
<p><img loading="lazy" class="wp-image-481941 size-full aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1.png?x10805" alt="LastPass Image 1" width="600" height="326" srcset="https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1.png 600w, https://www.gizmochina.com/wp-content/uploads/2022/08/LastPass-Image-1-300x163.png 300w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p><span style="font-weight: 400">The report states that the team has determined that two weeks ago, an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.</span></p>
<p><span style="font-weight: 400">In response to the </span><a href="https://www.gizmochina.com/tag/cybersecurity/"><span style="font-weight: 400">security incident</span></a><span style="font-weight: 400">, the company states that it has deployed containment and mitigation measures, and engaged with a leading </span><a href="https://www.gizmochina.com/tag/cybersecurity/"><span style="font-weight: 400">cybersecurity</span></a><span style="font-weight: 400"> and forensics firm. The investigation regarding LastPass’ security incident is still ongoing, and the company has notified its users that currently there is no evidence that this incident involved any access to customer data or encrypted password vaults. </span></p>
<p><span style="font-weight: 400">LastPass’ products and services are operating normally, and with regard to the incident, the company has also implemented additional enhanced </span><a href="https://www.gizmochina.com/tag/cybersecurity/"><span style="font-weight: 400">security</span></a><span style="font-weight: 400"> measures and is evaluating further mitigation techniques to strengthen the cybersecurity environment.</span></p>
<p><span style="font-weight: 400">Lastly, LastPass informs users that none of its users’ Master passwords have been compromised. LastPass says that it never stores or has knowledge of its </span>users’ Master Passwords. The password manager utilizes an industry-standard Zero Knowledge architecture that ensures LastPass can never know or gain access to their customers’ Master Password.</p>
<p>&nbsp;</p>
<p><b>RELATED:</b></p>
<ul>
<li><a href="https://www.gizmochina.com/2022/05/11/netflix-ad-supported-plan-password-sharing-fees/">Netflix could launch ad-supported plan and password sharing fees this year</a></li>
<li><a href="https://www.gizmochina.com/2022/07/26/iqoo-10-iqoo-10-pro-with-snapdragon-8-gen-1-goes-on-sale-in-china-starts-at-3699-yuan-548/">iQOO 10, iQOO 10 Pro with Snapdragon 8+ Gen 1 goes on sale in China, starts at 3,699 Yuan (~$548)</a></li>
<li><a href="https://www.gizmochina.com/2022/08/25/huawei-freebuds-pro-2-malaysia-launch/">Huawei Launches the Freebuds Pro 2, its Latest Premium Wireless ANC Earphones, in Malaysia</a></li>
<li><a href="https://www.gizmochina.com/2022/08/25/oppo-enco-buds-2-launched/">Oppo Enco Buds 2 Launched with 28-Hour Battery Life &amp;amp; 10mm Titanum Driver</a></li>
<li><a href="https://www.gizmochina.com/2022/07/25/472317/">Giztop is giving $100 OFF on Xiaomi 12S Pro Smartphone</a></li>
</ul>
<p><iframe loading="lazy" title="iQOO 10 Pro Full Review: Xiaomi 12S Pro&#039;s most threatening competitor" width="696" height="392" src="https://www.youtube.com/embed/kl_4LzhMwuc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><span style="font-weight: 400">(</span><a href="https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/"><span style="font-weight: 400">Source</span></a><span style="font-weight: 400">)</span></p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/08/26/password-manager-lastpass-hacked-august/">Password Manager LastPass Confirms They Were Hacked This Month</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MIT Discovers New Concerning Cybersecurity Flaw to Apple&#8217;s M1 Silicon – PACMAN</title>
		<link>https://www.gizmochina.com/2022/06/12/mit-discovers-cybersecurity-flaw-apples-m1-pacman/</link>
		
		<dc:creator><![CDATA[Leo Wong De Quan]]></dc:creator>
		<pubDate>Sun, 12 Jun 2022 02:50:10 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Apple M1]]></category>
		<category><![CDATA[ARM]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPad Air 5]]></category>
		<category><![CDATA[iPad Air M1]]></category>
		<category><![CDATA[ipad pro m1]]></category>
		<category><![CDATA[M1 PACMAN]]></category>
		<category><![CDATA[Macbook Air]]></category>
		<category><![CDATA[Macbook Air M1]]></category>
		<category><![CDATA[MacBook Pro]]></category>
		<category><![CDATA[PACMAN]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=465044</guid>

					<description><![CDATA[<img width="300" height="156" src="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-300x156.png?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="m1 pacman security flaw" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-300x156.png 300w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1024x532.png 1024w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-768x399.png 768w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1536x798.png 1536w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-696x362.png 696w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1068x555.png 1068w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-809x420.png 809w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw.png 1540w" sizes="(max-width: 300px) 100vw, 300px" /><p>Apple’s M1 series of silicon processors not only exists in its Mac Minis and Macbooks but also resides on the company’s iPads as well. Thus, a cybersecurity vulnerability in the SoC could lead to many modern Apple products being affected if they were to be targeted by a malicious attack. And after announcing the company’s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/06/12/mit-discovers-cybersecurity-flaw-apples-m1-pacman/">MIT Discovers New Concerning Cybersecurity Flaw to Apple&#8217;s M1 Silicon – PACMAN</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="156" src="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-300x156.png?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="m1 pacman security flaw" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-300x156.png 300w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1024x532.png 1024w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-768x399.png 768w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1536x798.png 1536w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-696x362.png 696w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1068x555.png 1068w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-809x420.png 809w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw.png 1540w" sizes="(max-width: 300px) 100vw, 300px" /><p><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">Apple’s M1</span></a><span style="font-weight: 400"> series of silicon processors not only exists in its Mac Minis and Macbooks but also resides on the company’s </span><a href="https://www.gizmochina.com/product/ipad-air-5/"><span style="font-weight: 400">iPads</span></a><span style="font-weight: 400"> as well. Thus, a cybersecurity vulnerability in the SoC could lead to many modern </span><a href="https://www.gizmochina.com/tag/apple/"><span style="font-weight: 400">Apple</span></a><span style="font-weight: 400"> products being affected if they were to be targeted by a malicious attack.</span></p>
<p><span style="font-weight: 400">And after announcing the company’s new </span><a href="https://www.gizmochina.com/tag/apple-m2/"><span style="font-weight: 400">M2 silicon processors</span></a><span style="font-weight: 400"> at </span><a href="https://www.gizmochina.com/tag/apple/"><span style="font-weight: 400">Apple</span></a><span style="font-weight: 400"> WWDC 2022, news broke out that the </span><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">Apple M1</span></a><span style="font-weight: 400"> silicon has been compromised in the cybersecurity department. And as both </span><a href="https://www.macworld.com/article/708912/mit-pacman-m1.html"><span style="font-weight: 400">MacWorld</span></a><span style="font-weight: 400"> and </span><a href="https://9to5mac.com/2022/06/10/pacman-m1-chip/"><span style="font-weight: 400">9to5Mac</span></a><span style="font-weight: 400"> quoted MIT researchers, the newly discovered security flaw defeats the last line of security of the </span><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">M1 SoC</span></a><span style="font-weight: 400"> and cannot be patched via software updates.</span></p>
<p><img loading="lazy" class="alignnone size-full wp-image-465047" src="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw.png?x10805" alt="m1 pacman security flaw" width="1540" height="800" srcset="https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw.png 1540w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-300x156.png 300w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1024x532.png 1024w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-768x399.png 768w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1536x798.png 1536w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-696x362.png 696w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-1068x555.png 1068w, https://www.gizmochina.com/wp-content/uploads/2022/06/m1-pacman-security-flaw-809x420.png 809w" sizes="(max-width: 1540px) 100vw, 1540px" /></p>
<p><span style="font-weight: 400">The highly concerning security vulnerability in </span><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">M1</span></a><span style="font-weight: 400"> is named &#8220;PACMAN&#8221; because it defeats the </span><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">M1</span></a><span style="font-weight: 400">’s Pointer Authentication Code (PAC) system. </span></p>
<p><a href="https://www.macworld.com/article/708912/mit-pacman-m1.html"><span style="font-weight: 400">MacWorld</span></a><span style="font-weight: 400"> explains that pointer authentication is a security feature that helps protect the CPU against an attacker that has gained memory access. Pointers store memory addresses, and pointer authentication code checks for unexpected pointer changes caused by an attack. In its research, MIT CSAIL created “PACMAN,” an attack that can find the correct value to successfully pass pointer authentication, so a hacker can continue with access to the computer.</span></p>
<p><a href="https://www.macworld.com/article/708912/mit-pacman-m1.html"><span style="font-weight: 400">Macworld</span></a><span style="font-weight: 400"> quotes an MIT article with MIT CSAIL’s Joseph Ravichandran, who is the co-lead author of a paper explaining PACMAN, “When pointer authentication was introduced, a whole category of bugs suddenly became a lot harder to use for attacks. With PACMAN making these bugs more serious, the overall attack surface could be a lot larger.”</span></p>
<p><span style="font-weight: 400">According to MIT CSAIL, since its PACMAN attack involves a hardware device, a software patch won’t fix the problem. The issue is a wider problem with </span><a href="https://www.gizmochina.com/tag/arm/"><span style="font-weight: 400">ARM</span></a><span style="font-weight: 400"> processors that use Pointer Authentication, not just </span><a href="https://www.gizmochina.com/tag/apple-m1/"><span style="font-weight: 400">Apple’s M1</span></a><span style="font-weight: 400">. “Future CPU designers should take care to consider this attack when building the secure systems of tomorrow,” Ravichandran wrote. “Developers should take care to not solely rely on pointer authentication to protect their software.”</span></p>
<p><span style="font-weight: 400">MIT was able to perform the PACMAN attack remotely. The team mentions that they actually did all their experiments over the network on a machine in another room, as they described “PACMAN works just fine remotely if you have unprivileged code execution.”</span></p>
<p><img loading="lazy" class="alignnone size-full wp-image-423110" src="https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash.jpg?x10805" alt="apple logo featured" width="5819" height="3879" srcset="https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash.jpg 5819w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-630x420.jpg 630w, https://www.gizmochina.com/wp-content/uploads/2021/11/laurenz-heymann-wAygsCk20h8-unsplash-1920x1280.jpg 1920w" sizes="(max-width: 5819px) 100vw, 5819px" /></p>
<p><a href="https://www.macworld.com/article/708912/mit-pacman-m1.html"><span style="font-weight: 400">Macworld</span></a><span style="font-weight: 400"> reports that </span><a href="https://www.gizmochina.com/tag/apple/"><span style="font-weight: 400">Apple</span></a><span style="font-weight: 400"> is aware of MIT CSAIL’s findings and issued the following statement: “We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own.”</span></p>
<p>&nbsp;</p>
<p><b>RELATED:</b></p>
<ul>
<li><a href="https://www.gizmochina.com/2022/06/07/apple-m2-chip-announced/">Apple M2 chip with better performance and capabilities announced for Mac devices</a></li>
<li><a href="https://www.gizmochina.com/2022/06/07/apple-macbook-air-m2-chip-launched/">Apple MacBook Air announced with 13.6-inch display, M2 chip, MagSafe charging, and more</a></li>
<li><a href="https://www.gizmochina.com/2022/03/09/apple-ipad-air-m1-chipset-launched/">Apple iPad Air powered by M1 processor and 5G support goes official; price starts at $599</a></li>
<li><a href="https://www.gizmochina.com/2022/04/20/get-redmi-k50-for-as-low-as-399-on-giztop/">Get Redmi K50 for as low as $399 on Giztop</a></li>
<li><a href="https://www.gizmochina.com/2022/03/31/redmi-k50-standard-review-dimensity-8100-best-chip-of-the-year/">Redmi K50 Standard Review: Dimensity 8100 &#8212; probably the Best Chip of the year</a></li>
</ul>
<p><iframe loading="lazy" title="Redmi K50 Standard Review: Dimensity 8100 -- probably the best chip of the year" width="696" height="392" src="https://www.youtube.com/embed/q075m7ZZm7E?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><span style="font-weight: 400">(</span><a href="https://www.macworld.com/article/708912/mit-pacman-m1.html"><span style="font-weight: 400">Via 1</span></a><span style="font-weight: 400">, </span><a href="https://9to5mac.com/2022/06/10/pacman-m1-chip/"><span style="font-weight: 400">Via 2</span></a><span style="font-weight: 400">)</span></p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/06/12/mit-discovers-cybersecurity-flaw-apples-m1-pacman/">MIT Discovers New Concerning Cybersecurity Flaw to Apple&#8217;s M1 Silicon – PACMAN</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiaomi Debuts “Pure Mode” on its MIUI in China, similar to “Security Check” Found on ColorOS</title>
		<link>https://www.gizmochina.com/2022/01/16/xiaomi-pure-mode-miui/</link>
		
		<dc:creator><![CDATA[Leo Wong De Quan]]></dc:creator>
		<pubDate>Sun, 16 Jan 2022 02:47:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Xiaomi]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MIUI]]></category>
		<category><![CDATA[MIUI 13]]></category>
		<category><![CDATA[Smartphones]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=437776</guid>

					<description><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-300x169.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Xiaomi MIUI Logo Featured" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-300x169.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-768x432.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1024x576.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-696x392.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1068x601.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-747x420.jpg 747w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1920x1080.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" /><p>In September 2021, Xiaomi started to recruit beta testers for its “Pure Mode” found on the Chinese version of MIUI. However, Xiaomi didn&#8217;t update the progress of the development of the “Pure Mode” until recently. Initially thought to be scrapped, one MIUI user in China has noticed that Xiaomi has already silently rolled the “Pure [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/01/16/xiaomi-pure-mode-miui/">Xiaomi Debuts “Pure Mode” on its MIUI in China, similar to “Security Check” Found on ColorOS</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-300x169.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Xiaomi MIUI Logo Featured" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-300x169.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-768x432.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1024x576.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-696x392.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1068x601.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-747x420.jpg 747w, https://www.gizmochina.com/wp-content/uploads/2021/06/Xiaomi-MIUI-Logo-Featured-1920x1080.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" /><p><span style="font-weight: 400;">In September 2021, <a href="https://www.gizmochina.com/tag/xiaomi/">Xiaomi</a> started to recruit beta testers for its “Pure Mode” found on the Chinese version of <a href="https://www.gizmochina.com/tag/miui/">MIUI</a>. However, Xiaomi didn&#8217;t update the progress of the development of the “Pure Mode” until recently. Initially thought to be scrapped, one MIUI user in China has noticed that Xiaomi has already silently rolled the “Pure Mode” functionality to its smartphones as of 15 January 2022.</span></p>
<p><img loading="lazy" class="wp-image-430758 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A.jpg?x10805" alt="MIUI 13 Logo Featured A" width="619" height="347" srcset="https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A.jpg 4000w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-300x169.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-768x432.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-1024x576.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-1068x601.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-747x420.jpg 747w, https://www.gizmochina.com/wp-content/uploads/2021/12/MIUI-13-Logo-Featured-A-1920x1080.jpg 1920w" sizes="(max-width: 619px) 100vw, 619px" /></p>
<p><span style="font-weight: 400;">In a nutshell, “Pure Mode” in <a href="https://www.gizmochina.com/tag/miui/">MIUI</a> helps to guard your online safety by preventing you from downloading malicious apps from the Internet, which is essentially the “Security Check” found on Chinese ColorOS devices from <a href="https://www.gizmochina.com/tag/oppo/">Oppo</a>, <a href="https://www.gizmochina.com/category/realme/">Realme</a>, and <a href="https://www.gizmochina.com/tag/oneplus/">OnePlus</a> but now on your <a href="https://www.gizmochina.com/tag/xiaomi/">Xiaomi</a> smartphone. However, the one important difference is that ColorOS’ implementation is to scan the app for malware after installation, whereas MIUI’s implementation is safer for the end-user: the app is installed after Xiaomi has done a background check of the app. </span></p>
<p><span style="font-weight: 400;">The specifics of “Pure Mode” are in the system menu and when using “Pure Mode”, it has 4 highlighting features:</span></p>
<ol>
<li style="font-weight: 400;"><span style="font-weight: 400;">Virus Detection: To detect if there’s any virus, Trojan horses or malware hidden within the app</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Privacy Detection: To detect if the app is unknowingly collecting the user’s personal data without consent</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Compatibility Detection: To detect if the app is compatible with the phone it will be installed, to prevent any crashes or bugs from occurring.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Manual review: Apps allowed in Pure Mode are manually reviewed, installed, and tested by real users to confirm their compatibility and safety.</span></li>
</ol>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">As to how to enable “Pure Mode” in MIUI, there are 2 methods to do so.</span></p>
<p><span style="font-weight: 400;">Method 1: After entering into the app installer of <a href="https://www.gizmochina.com/tag/miui/">MIUI</a>, on the top right corner, tap into “Settings” and then “Pure Mode”, and then tap the “Turn On Now” button to turn on Pure Mode.</span></p>
<p><span style="font-weight: 400;">Method 2: When installing an app that has not been checked by “Safe Mode” yet, in the successful installation popup afterward, select “Turn On Pure Mode” to do a security check on the app.</span></p>
<p><figure id="attachment_437778" aria-describedby="caption-attachment-437778" style="width: 653px" class="wp-caption aligncenter"><img loading="lazy" class=" wp-image-437778" src="https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1.jpg?x10805" alt="Xiaomi-Pure-Mode-1" width="653" height="1415" srcset="https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1.jpg 820w, https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1-138x300.jpg 138w, https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1-768x1664.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1-473x1024.jpg 473w, https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1-696x1508.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2022/01/Xiaomi-Pure-Mode-1-194x420.jpg 194w" sizes="(max-width: 653px) 100vw, 653px" /><figcaption id="caption-attachment-437778" class="wp-caption-text">MIUI Pure Mode User Interface</figcaption></figure></p>
<p><span style="font-weight: 400;">After Pure Mode is turned on, apps that have not been manually reviewed by Xiaomi will undergo manual security tests to ensure it meets the necessary requirements of “Pure Mode”. If the app has been reviewed as Safe by <a href="https://www.gizmochina.com/tag/xiaomi/">Xiaomi</a>, then you may proceed to install the app. </span></p>
<p><span style="font-weight: 400;">For apps that have not yet been reviewed or have been deemed risky by Xiaomi, users won’t be able to install them. If you trust the unreviewed or risky app, you can continue to install it after you go into “Settings” &gt; “Pure Mode” &gt; “Authorize this installation”, to continue to install your app.</span></p>
<p><span style="font-weight: 400;">If you want to disable “Pure Mode”, then the steps are simple too. Entering into the app installer of <a href="https://www.gizmochina.com/tag/miui/">MIUI</a>, on the top right corner, tap into “Settings” &gt; “Pure Mode”, and then tap the “Turn Off Now” button to disable Pure Mode.</span></p>
<p>&nbsp;</p>
<p><strong>RELATED:</strong></p>
<ul>
<li><a href="https://www.gizmochina.com/2022/01/14/xiaomi-phones-do-not-feature-censorship-tools/">Xiaomi phones do not feature hidden censorship tools: German IT group</a></li>
<li><a href="https://www.gizmochina.com/2022/01/12/xiaomi-mi-10s-gets-gets-miui-13-stable-update-for-testers-in-china/">Xiaomi Mi 10S gets MIUI 13 Stable update for testers in China</a></li>
<li><a href="https://www.gizmochina.com/2022/01/03/miui-13-anti-fraud-scam/">[UPDATED] Xiaomi’s MIUI 13 can now protect you from phone frauds and scams in China, here’s how they do it</a></li>
</ul>
<p><iframe loading="lazy" title="Xiaomi 12 Pro Full Review: The smoothest and most stable Xiaomi phone" width="696" height="392" src="https://www.youtube.com/embed/9aY-AP6U1vs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><span style="font-weight: 400;">(</span><a href="https://www.ithome.com/0/598/637.htm"><span style="font-weight: 400;">Via</span></a><span style="font-weight: 400;">)</span></p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2022/01/16/xiaomi-pure-mode-miui/">Xiaomi Debuts “Pure Mode” on its MIUI in China, similar to “Security Check” Found on ColorOS</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiaomi offers one of the best IoT security in the world: IoTSF</title>
		<link>https://www.gizmochina.com/2021/11/11/xiaomi-offers-best-iot-security-iotsf/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Thu, 11 Nov 2021 12:31:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Xiaomi]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IOT]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=424570</guid>

					<description><![CDATA[<img width="300" height="206" src="https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-300x206.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-300x206.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-768x527.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-100x70.jpg 100w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-218x150.jpg 218w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-696x478.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-612x420.jpg 612w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured.jpg 798w" sizes="(max-width: 300px) 100vw, 300px" /><p>Xiaomi has just been awarded top rating for its IoT security by the Internet of Things Security Foundation (IoTSF). The group stated that the smartphone maker among the best in the world in terms of its security policy for IoT. The Chinese tech giant had recently participated in the IoTSF 2021 Virtual Conference earlier this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2021/11/11/xiaomi-offers-best-iot-security-iotsf/">Xiaomi offers one of the best IoT security in the world: IoTSF</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="206" src="https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-300x206.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-300x206.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-768x527.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-100x70.jpg 100w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-218x150.jpg 218w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-696x478.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured-612x420.jpg 612w, https://www.gizmochina.com/wp-content/uploads/2020/02/Mi-AIoT-Router-AX3600-featured.jpg 798w" sizes="(max-width: 300px) 100vw, 300px" /><p><a href="https://www.gizmochina.com/tag/xiaomi/" target="_blank" rel="noopener noreferrer">Xiaomi</a> has just been awarded top rating for its IoT security by the Internet of Things Security Foundation (IoTSF). The group stated that the smartphone maker among the best in the world in terms of its security policy for IoT.</p>
<p><img loading="lazy" class="aligncenter wp-image-309181 size-full" src="https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6.jpg?x10805" alt="Xiaomi Mi AIoT Router AX3600 (WiFi 6)" width="900" height="666" srcset="https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6.jpg 900w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-300x222.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-768x568.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-80x60.jpg 80w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-485x360.jpg 485w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-696x515.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/03/Xiaomi-Mi-AIoT-Router-AX3600-WiFi-6-568x420.jpg 568w" sizes="(max-width: 900px) 100vw, 900px" /></p>
<p>The Chinese tech giant had recently participated in the IoTSF 2021 Virtual Conference earlier this month, with the event being focused around IoT cybersecurity. Xiaomi is currently the world&#8217;s largest consumer AIoT platform and it shared its insights on IoT security in this event. Now, IoTSF released a new report that stated that the brand is one of the best companies implementing vulnerability disclosure policies, highlighting Xiaomi&#8217;s leading position in IoT security.</p>
<p>For those unaware, the IoTSF was founded back in 2015 and was made to address the growing threats to IoT applications. As of right now, the group has more than 100 members, which includes major players like ARM, Cisco, BSI, Mastercard, and others that are interested in finding ways to protect IoT security. In the event, the group also discussed various topics related to the IoT security issues while also sharing the latest researches and innovations within the field that would help build a safe,reliable, and trustworthy IoT ecosystem.</p>
<p><img loading="lazy" class="size-full wp-image-424578 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2021/11/11.png?x10805" alt="Xiaomi" width="580" height="545" srcset="https://www.gizmochina.com/wp-content/uploads/2021/11/11.png 580w, https://www.gizmochina.com/wp-content/uploads/2021/11/11-300x282.png 300w, https://www.gizmochina.com/wp-content/uploads/2021/11/11-447x420.png 447w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<p>Notably, the IoTSF even shared a list of companies under <a href="https://www.iotsecurityfoundation.org/wp-content/uploads/2021/11/The-Contemporary-Use-of-Vulnerability-Disclosure-in-IoT-IoTSF-Report-4-November-2021.pdf" target="_blank" rel="noopener noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://www.iotsecurityfoundation.org/wp-content/uploads/2021/11/The-Contemporary-Use-of-Vulnerability-Disclosure-in-IoT-IoTSF-Report-4-November-2021.pdf&amp;source=gmail&amp;ust=1636713989344000&amp;usg=AOvVaw3rK6kRWljHG-0VXOLzpbnC">the Contemporary Use of Vulnerability Disclosure Report</a>. In this report, Xiaomi was on the &#8220;Green list,&#8221; which are firms that meet the basic requirements and also meet the &#8220;extended threshold test of IoTSF.&#8221; Other top 20 companies include, Google, LG, Microsoft, Bosch, BT, Canon, Panasonic, and more.</p>
<p><strong>RELATED:</strong></p>
<ul>
<li><a href="https://www.gizmochina.com/2021/11/11/best-double-11-sale-deals-from-xiaomi-online-stores-at-aliexpress/" target="_blank" rel="noopener noreferrer">Best Double 11 Sale Deals from Xiaomi Online Stores at AliExpress</a></li>
<li><a href="https://www.gizmochina.com/2021/11/11/double-11-sale-best-smartwatch-deals-aliexpress-xiaomi-oneplus-realme-more/" target="_blank" rel="noopener noreferrer">[Double 11 Sale] Best Smartwatch Deals &#8211; Xiaomi, OnePlus, Realme &#038; More</a></li>
<li><a href="https://www.gizmochina.com/2021/11/11/best-smartphone-deals-aliexpress-double-11-sale-2021/" target="_blank" rel="noopener noreferrer">[Double 11 Sale ] Best Smartphone Deals from Xiaomi, Redmi, OnePlus &#038; More!</a></li>
<li><a href="https://www.gizmochina.com/2021/11/09/xiaomi-patent-smart-wheelchair-adapt-for-users/" target="_blank" rel="noopener noreferrer">Xiaomi patents Smart Wheelchair that offers improved comfort by adapting to its user</a></li>
</ul>
<p><iframe loading="lazy" title="Redmi Note 11 Pro vs Note 11 Pro+ comparison: which one is more recommendable?" width="696" height="392" src="https://www.youtube.com/embed/PHPGd2cxwZ0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2021/11/11/xiaomi-offers-best-iot-security-iotsf/">Xiaomi offers one of the best IoT security in the world: IoTSF</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Canon suffers a Maze Ransomware attack, 10TB worth of Users&#8217;  data stolen</title>
		<link>https://www.gizmochina.com/2020/08/06/canon-maze-ransomware-attack-10tb-data-stolen/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Thu, 06 Aug 2020 10:40:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Canon]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=335821</guid>

					<description><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w" sizes="(max-width: 300px) 100vw, 300px" /><p>Canon has recently been hit with a ransomware attack. It has affected a number of its services, including Canon&#8217;s email, Microsoft Teams, company&#8217;s USA website, and other internal applications as well. BleepingComputer had reported on the incident after tracking an outage on Canon&#8217;s image.canon cloud photo and video storage service. This resulted in the loss [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/08/06/canon-maze-ransomware-attack-10tb-data-stolen/">Canon suffers a Maze Ransomware attack, 10TB worth of Users&#8217;  data stolen</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w" sizes="(max-width: 300px) 100vw, 300px" /><p><a href="https://www.gizmochina.com/tag/canon/" target="_blank" rel="noopener noreferrer">Canon</a> has recently been hit with a ransomware attack. It has affected a number of its services, including Canon&#8217;s email,<a href="https://www.gizmochina.com/tag/microsoft-teams/" target="_blank" rel="noopener noreferrer"> Microsoft Teams</a>, company&#8217;s USA website, and other internal applications as well.</p>
<p><img loading="lazy" class="aligncenter wp-image-335822 size-full" src="https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168.png?x10805" alt="Canon" width="1443" height="611" srcset="https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168.png 1443w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-300x127.png 300w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-768x325.png 768w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-1024x434.png 1024w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-696x295.png 696w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-1068x452.png 1068w, https://www.gizmochina.com/wp-content/uploads/2020/08/Screenshot-65-e1596710168168-992x420.png 992w" sizes="(max-width: 1443px) 100vw, 1443px" /></p>
<p><a href="https://www.bleepingcomputer.com/news/security/canon-hit-by-maze-ransomware-attack-10tb-data-allegedly-stolen/" target="_blank" rel="noopener noreferrer"><em>BleepingComputer</em> </a>had reported on the incident after tracking an outage on Canon&#8217;s image.canon cloud photo and video storage service. This resulted in the loss of data worth 10TB for users that utilized the storage feature. The outage occurred on 30th July 2020 and lasted over six days. Meanwhile, the site would display status updates until it went back in service on 4th August 2020.</p>
<h6 class="related"><strong>Editor&#8217;s Pick: <a href="https://www.gizmochina.com/2020/08/06/samsung-galaxy-note-20-note-20-ultra-5gindia-pricing-confirmed-pre-orders-begin/" target="_blank" rel="noopener noreferrer">Samsung Galaxy Note 20, Note 20 Ultra 5G India pricing confirmed, pre-orders begin</a></strong></h6>
<p>Furthermore, an internal source reached out to <em>BleepingComputer</em>, sharing an image of a company wide notification. This message was titled &#8220;Message from IT Service Center,&#8221; which was sent by Canon&#8217;s IT department. According to this message, Canon was experiencing a &#8220;wide spread system issues affecting multiple applications, Teams, Email, and other systems may not be available at this time.&#8221;</p>
<p><img loading="lazy" class=" wp-image-96814 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2016/09/canon-logo.png?x10805" alt="" width="483" height="483" srcset="https://www.gizmochina.com/wp-content/uploads/2016/09/canon-logo.png 300w, https://www.gizmochina.com/wp-content/uploads/2016/09/canon-logo-150x150.png 150w" sizes="(max-width: 483px) 100vw, 483px" /></p>
<p>A number of Canon domains were also affected by the cyberattack, while an alleged ransom note had been discovered soon after. The attack was from the Maze ransomware, who stated that they stole, &#8220;10 terabytes of data, private databases, etc,&#8221; for their attack on Canon. Although, Maze also revealed that the image.canon outage was not caused by them. Maze has stolen unencrypted files from servers and backups and has harvested the network of anything of value and gain access to a Windows domain controller. They have also been responsible for other high profile attacks in the past as well, so we will have to wait and see how the situation develops further.</p>
<h6 class="related"><strong>UP NEXT: <a href="https://www.gizmochina.com/2020/08/06/oneplus-ceo-confirms-always-on-display-oxygenos-11/" target="_blank" rel="noopener noreferrer">OnePlus CEO: OxygenOS 11 will bring Always on Display for smartphones</a></strong></h6>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/08/06/canon-maze-ransomware-attack-10tb-data-stolen/">Canon suffers a Maze Ransomware attack, 10TB worth of Users&#8217;  data stolen</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Researchers warn against new Cybersecurity threats during Coronavirus pandemic</title>
		<link>https://www.gizmochina.com/2020/04/22/researchers-warn-against-new-cybersecurity-threats-during-coronavirus-pandemic/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Wed, 22 Apr 2020 10:17:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=318472</guid>

					<description><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w" sizes="(max-width: 300px) 100vw, 300px" /><p>The world is gripped by the recent Coronavirus pandemic that has affected virtually every country. However, the threats from the virus may not be limited just there as researchers warn against increasing cybersecurity threats amidst the ongoing crisis. As various governments are enforcing lockdowns, work is quickly shifting towards the digital and online realms. But [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/04/22/researchers-warn-against-new-cybersecurity-threats-during-coronavirus-pandemic/">Researchers warn against new Cybersecurity threats during Coronavirus pandemic</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w" sizes="(max-width: 300px) 100vw, 300px" /><p>The world is gripped by the recent <a href="https://www.gizmochina.com/tag/coronavirus/" target="_blank" rel="noopener noreferrer">Coronavirus</a> pandemic that has affected virtually every country. However, the threats from the virus may not be limited just there as researchers warn against increasing cybersecurity threats amidst the ongoing crisis.</p>
<p>As various governments are enforcing lockdowns, work is quickly shifting towards the digital and online realms. But with this increase in traffic online, apart from just pressures on ISPs and telecom operators, it seems that risk online has increased as well. At the moment, crucial fields like education are under transition, but researchers have warned against potential risks.</p>
<p><img loading="lazy" class="size-full wp-image-297545 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1.jpg?x10805" alt="" width="945" height="475" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1.jpg 945w, https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1-300x151.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1-768x386.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1-696x350.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2019/12/424a9c7cc05d238ae1022307c7fb3c12-1-836x420.jpg 836w" sizes="(max-width: 945px) 100vw, 945px" /></p>
<p>According to CNCERT (National Computer Network Emergency Response Technical Team and Coordination Center of China), “More businesses in traditional industries are accelerating their digital transformation by using remote-working technologies to ensure business continuity, resulting in a spike in cyber threats arising from data leakage, phishing scams, ransomware, and internet frauds.”</p>
<h6 class="related"><strong>Editor&#8217;s Pick: <a href="https://www.gizmochina.com/2020/04/22/huawei-smartphones-sold-over-450000-units-in-china-in-march-the-p40-series-arrives-with-hms-ceo/">Huawei smartphones sold over 450,000 units in China in March, the P40 series arrives with HMS: CEO</a></strong></h6>
<p>The firm is a Chinese government cybersecurity agency that believes that remote working apps, online medical consultations, and e-learning systems could potentially harbor various risks, like hackers that could exploit vulnerabilities. Examples of this occurring is already here as online educational platforms have been suffering from DDoS attacks (Distributed denial-of-service) ever since the COVID-19 lockdowns began. This even goes as far back in January 2020.</p>
<p>These DDoS attacks essentially crash the server since it bombards the system with a massive number of requests. Similarly, phishing attacks are another attempt through which hackers try and gain access to sensitive data. These may be in the form of usernames, passwords, or even credit card details and can be made through communications online like fraud emails.</p>
<p><img loading="lazy" class="size-full wp-image-297549 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg?x10805" alt="" width="620" height="414" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w" sizes="(max-width: 620px) 100vw, 620px" /></p>
<p>An example of an organized hacker group is DarkHotel. This East Asia based group has already attempted to break into to the World Health Organization&#8217;s (WHO) internal system. Furthermore, they are also responsible for coordinated cyber espionage campaigns against various Chinese agencies and their diplomatic mission through VPNs (virtual private network).</p>
<h6 class="related"><strong>UP NEXT: <a href="https://www.gizmochina.com/2020/04/22/huawei-sees-low-revenue-growth-in-first-quarter-coronavirus-and-us-pressures-hit-hard/">Huawei sees low Revenue Growth in first quarter, Coronavirus and US Sanctions hit hard</a></strong></h6>
<p>&nbsp;</p>
<p>(<a href="https://www.scmp.com/tech/enterprises/article/3080876/new-cybersecurity-threats-emerging-amid-coronavirus-pandemic" target="_blank" rel="noopener noreferrer">Via</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/04/22/researchers-warn-against-new-cybersecurity-threats-during-coronavirus-pandemic/">Researchers warn against new Cybersecurity threats during Coronavirus pandemic</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Indian Apple users are one of the worst affected by macOS Malware Shlayer: Report</title>
		<link>https://www.gizmochina.com/2020/01/28/indian-apple-users-are-one-of-the-worst-affected-by-macos-malware-shlayer-report/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Tue, 28 Jan 2020 09:46:31 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=302608</guid>

					<description><![CDATA[<img width="300" height="180" src="https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16-300x180.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="macbook pro 16 inch" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16-300x180.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16.jpg 666w" sizes="(max-width: 300px) 100vw, 300px" /><p>According to a new report, Indians are one of the most affected by the macOS malware called Shlayer. This is one of the most widespread macOS malware in 2019 and has infected the most number of devices in the Southeast Asian subcontinent. Kaspersky, a cybersecurity expert, reported that Shlayer utilizes a smart malware distribution system [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/01/28/indian-apple-users-are-one-of-the-worst-affected-by-macos-malware-shlayer-report/">Indian Apple users are one of the worst affected by macOS Malware Shlayer: Report</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="180" src="https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16-300x180.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="macbook pro 16 inch" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16-300x180.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/09/macbook-pro-16.jpg 666w" sizes="(max-width: 300px) 100vw, 300px" /><p>According to a new report, Indians are one of the most affected by the <a href="https://www.gizmochina.com/tag/macos/" target="_blank" rel="noopener noreferrer">macOS</a> malware called Shlayer. This is one of the most widespread macOS malware in 2019 and has infected the most number of devices in the Southeast Asian subcontinent.</p>
<p>Kaspersky, a cybersecurity expert, reported that Shlayer utilizes a smart malware distribution system that allows it to spread via a partner network, entertainment websites and even Wikipedia. This showcases the scale of the rampant malware is and that even established and well known websites are infected and need additional security measures put in place.</p>
<p><img loading="lazy" class="size-full wp-image-178577 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2018/03/Leagoo-virus-2.png?x10805" alt="Leagoo virus" width="791" height="549" /></p>
<p>In the data, it is seen that India arrives second only to the US in terms of the total number of affected users. The former sits at 18.9 percent while the latter has a massive 31 percent, with numbers further expected to grow. Similarly, Germany ranks third with 14 percent while France and the UK trail behind with 10 percent each respectively.</p>
<p>Anton Ivanov, Kaspersky Security Analyst, stated that &#8220;The macOS platform is a good source of revenue for cybercriminals, who are constantly looking for new ways to deceive users, and actively use social engineering techniques to spread their malware. This case demonstrates that such threats can be found even on legitimate sites.&#8221; But, &#8220;Luckily for macOS users, the most widespread threats that target macOS currently revolve around feeding illicit advertising rather than something more dangerous, such as stealing financial data.&#8221;</p>
<h6 class="related"><strong>Editor&#8217;s Pick: <a href="https://www.gizmochina.com/2020/01/28/apple-to-manufacture-116m-iphones-in-1h-2020-to-meet-huge-demand-for-iphone-se-2-iphone-9/">Apple to manufacture 116m iPhones in 1H 2020 to meet huge demand for iPhone SE 2 / iPhone 9</a></strong></h6>
<p>In other words, macOS platform is an active target for cybercriminals which aim to make a profit by selling services based around advertising and other forms of illegal and unavoidable branding. Meaning, Apple users currently do not face any major risk apart from a few annoying pop up ads and more but the fact that it is possible might eventually lead to further harmful malware in the near future.</p>
<p><figure id="attachment_220232" aria-describedby="caption-attachment-220232" style="width: 728px" class="wp-caption aligncenter"><img loading="lazy" class="wp-image-220232 size-full" src="https://www.gizmochina.com/wp-content/uploads/2018/10/apple-macbook-air-2.jpg?x10805" alt="Apple MacBook Air" width="728" height="642" srcset="https://www.gizmochina.com/wp-content/uploads/2018/10/apple-macbook-air-2.jpg 728w, https://www.gizmochina.com/wp-content/uploads/2018/10/apple-macbook-air-2-300x265.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" /><figcaption id="caption-attachment-220232" class="wp-caption-text">Apple MacBook Air</figcaption></figure></p>
<p>As of right now, the malware is only based around installing adware that modifies search results, gather user search history and feed illicit advertisements without user consent. Furthermore, Shlayer attacks reportedly account for nearly a third of all malware infections on the macOS; and are also responsible for the installation of other adware like AdWare.OSX.Bnodlero, AdWare. OSX.Geonei, AdWare.OSX.Pirrit and AdWare.OSX.Cimpli.</p>
<h6 class="related"><strong>UP NEXT: <a href="https://www.gizmochina.com/2020/01/28/samsung-galaxy-s20-official-cases-leaked-features-led-rugged-design-and-see-through-covers/">Samsung Galaxy S20 Official cases leaked, features LED, rugged design and see through covers</a></strong></h6>
<p>&nbsp;</p>
<p>(<a href="https://gadgets.ndtv.com/laptops/news/indians-among-the-most-affected-by-macos-malware-shlayer-kaspersky-2170504" target="_blank" rel="noopener noreferrer">Via</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/01/28/indian-apple-users-are-one-of-the-worst-affected-by-macos-malware-shlayer-report/">Indian Apple users are one of the worst affected by macOS Malware Shlayer: Report</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Chinese Hacker group said to be behind the cyberattack on Mitsubishi Electric, Data breach confirmed</title>
		<link>https://www.gizmochina.com/2020/01/20/mitsubishi-electric-has-faced-a-cyberattack-by-a-chinese-hacker-group-report/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Mon, 20 Jan 2020 09:50:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=301463</guid>

					<description><![CDATA[<img width="300" height="150" src="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-300x150.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-300x150.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-768x384.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-696x348.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-840x420.jpg 840w" sizes="(max-width: 300px) 100vw, 300px" /><p>Earlier today (20th January 2020), Mitsubishi Electric Corp announced that it had been the target of a series of cyberattacks that has led to information regarding Government agencies and other business partners being compromised. Mitsubishi Electric is an integral asset in Japan&#8217;s defense and infrastructure industries. Hence, the cyberattack implies a possible leak of information, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/01/20/mitsubishi-electric-has-faced-a-cyberattack-by-a-chinese-hacker-group-report/">Chinese Hacker group said to be behind the cyberattack on Mitsubishi Electric, Data breach confirmed</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="150" src="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-300x150.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-300x150.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-768x384.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-696x348.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-840x420.jpg 840w" sizes="(max-width: 300px) 100vw, 300px" /><p>Earlier today (20th January 2020), Mitsubishi Electric Corp announced that it had been the target of a series of cyberattacks that has led to information regarding Government agencies and other business partners being compromised.</p>
<p>Mitsubishi Electric is an integral asset in Japan&#8217;s defense and infrastructure industries. Hence, the cyberattack implies a possible leak of information, such as email exchanges with the Defense Ministry and the Nuclear Regulation Authority. Furthermore, even documents related to projects with private organizations, railway operators, telecommunications and automakers are also at risk.</p>
<p><img loading="lazy" class="alignnone wp-image-297549" src="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg?x10805" alt="" width="681" height="455" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF.jpg 620w, https://www.gizmochina.com/wp-content/uploads/2019/12/201912231455446402_Chinese-APT20-hacker-group-bypassing-2FA-in-latest-attacks_SECVPF-300x200.jpg 300w" sizes="(max-width: 681px) 100vw, 681px" /></p>
<p>However, the company has also assured that no highly important data regarding infrastructure operations have been breached. Previously, Mitsubishi had conducted an internal investigation in June 2019 after an irregular activity was noticed on devices located in Japan. The investigation found unauthorized access to the management section at its head office and other departments.</p>
<h6 class="related"><strong>Editor&#8217;s Pick: <a href="https://www.gizmochina.com/2020/01/20/google-pixel-4-spotted-running-the-upcoming-android-11-r-developer-preview/">Google Pixel 4 spotted running the upcoming Android 11 “R” Developer Preview</a></strong></h6>
<p>According to reports, a Chinese hacker group is suspected of attacking Mitsubishi Electrics by gaining unauthorized access to personal computers and services. It is being said that the cyberattack had targetted information related to job applicants and employees of the month alongside sales and technologies as well. Although, it is still a call for caution as even cybersecurity experts in the field are susceptible to cyberterrorism.</p>
<p><img loading="lazy" class="size-full wp-image-301473 aligncenter" src="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH.jpg?x10805" alt="" width="1024" height="512" srcset="https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-300x150.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-768x384.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-696x348.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2020/01/ASUH-840x420.jpg 840w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Since the attack, Yoshihide Suga (Chief Cabinet Secretary) has mentioned that &#8220;no leak of sensitive information regarding defense equipment and electricity&#8221; has taken place and also sent outa public apology for the sudden unrest that was caused. Notably, Mitsubishi Electic is a major manufacturer in the field of defense and is accredited with the 3rd largest contract for major defense equipment at the Defense Ministry, according to a discal report of 2018.</p>
<h6 class="related"><strong>UP NEXT: <a href="https://www.gizmochina.com/2020/01/20/oneplus-8-pro-leaked-hands-on-image-reveals-120hz-selection-option-in-settings-menu/">OnePlus 8 Pro leaked hands-on image reveals 120Hz selection option in Settings menu</a></strong></h6>
<p>&nbsp;</p>
<p>(<a href="https://asia.nikkei.com/Business/Companies/Mitsubishi-Electric-data-may-have-been-compromised-in-cyberattack" target="_blank" rel="noopener noreferrer">Via</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2020/01/20/mitsubishi-electric-has-faced-a-cyberattack-by-a-chinese-hacker-group-report/">Chinese Hacker group said to be behind the cyberattack on Mitsubishi Electric, Data breach confirmed</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Disputes over Huawei security threats leads to Czechs Cybersecurity Chief being fired</title>
		<link>https://www.gizmochina.com/2019/12/18/disputes-over-huawei-security-threats-leads-to-czechs-cybersecurity-chief-being-fired/</link>
		
		<dc:creator><![CDATA[Sean]]></dc:creator>
		<pubDate>Wed, 18 Dec 2019 07:15:42 +0000</pubDate>
				<category><![CDATA[Huawei]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Huawei ban]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=295917</guid>

					<description><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Huawei" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-630x420.jpg 630w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo.jpg 1200w" sizes="(max-width: 300px) 100vw, 300px" /><p>Huawei, the smartphone manufacturer, has faced multiple issues and allegations from different western Governments over the past one year. These accusations are generally related to security and information and have seen it receive a ban in the US and issues in its European region of operations as well. Now, the Chinese tech giant is facing [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2019/12/18/disputes-over-huawei-security-threats-leads-to-czechs-cybersecurity-chief-being-fired/">Disputes over Huawei security threats leads to Czechs Cybersecurity Chief being fired</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="200" src="https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-300x200.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="Huawei" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-1024x683.jpg 1024w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-1068x712.jpg 1068w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo-630x420.jpg 630w, https://www.gizmochina.com/wp-content/uploads/2019/09/huawei-logo.jpg 1200w" sizes="(max-width: 300px) 100vw, 300px" /><p><a href="https://www.gizmochina.com/brand/huawei/" target="_blank" rel="noopener noreferrer">Huawei</a>, the smartphone manufacturer, has faced multiple <a href="https://www.gizmochina.com/2019/11/29/huawei-suing-us-fcc-over-national-security-risk-allegations/" target="_blank" rel="noopener noreferrer">issues and allegations from different western Governments</a> over the past one year. These accusations are generally related to security and information and have seen it receive <a href="https://www.gizmochina.com/2019/05/20/huawei-banned-from-using-google-services-future-phones-to-feature-proprietary-os/" target="_blank" rel="noopener noreferrer">a ban in the US</a> and<a href="https://www.gizmochina.com/2019/11/28/huawei-banned-by-spains-ministry-of-defense-from-accessing-sensitive-information/" target="_blank" rel="noopener noreferrer"> issues in its European region of operations</a> as well.</p>
<p>Now, the Chinese tech giant is facing more problems, but this time in Eastern Europe, in the Czech Republic; as amidst the disputes regarding Huawei&#8217;s security threat, the country&#8217;s Cybersecurity Chief has just been fired.</p>
<p><figure id="attachment_282335" aria-describedby="caption-attachment-282335" style="width: 780px" class="wp-caption aligncenter"><img loading="lazy" class="wp-image-282335 size-full" src="https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag.jpg?x10805" alt="Huawei" width="780" height="520" srcset="https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag.jpg 780w, https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag-300x200.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag-768x512.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag-696x464.jpg 696w, https://www.gizmochina.com/wp-content/uploads/2019/10/US-China-flag-630x420.jpg 630w" sizes="(max-width: 780px) 100vw, 780px" /><figcaption id="caption-attachment-282335" class="wp-caption-text">Huawei being caught in the crossfires of the US-China Trade Disputes</figcaption></figure></p>
<p>According to a new report, Dusan Navratil, who became the first director of the National Cyber and Information security Agency (also knows as Nukib), has just been fired by the leading Government. This arrives after he was alleged to lack experience, managerial skills, and communication expertise for the job. Reportedly, the Czech Government unanimously agreed to the dismissal of Navratil, who also served as head of the National Security Authority for 10 years.</p>
<p>Navratil said he was &#8220;surprised&#8221; over this sudden dismissal by the Prime Minister and has refused to comment further on the situation. The cybersecurity chief was known for being involved in a year-long controversy over his December 2018 reports that condemned Chinese brands like Huawei and <a href="https://www.gizmochina.com/brand/zte/" target="_blank" rel="noopener noreferrer">ZTE</a> for being national security threats.</p>
<h6 class="related"><strong>Editor&#8217;s Pick: <a href="https://www.gizmochina.com/2019/12/17/honor-and-stoned-co-to-launch-special-edition-honor-9x-on-dec-20/">Honor and Stoned &amp; Co. to launch special edition Honor 9X on Dec. 20</a></strong></h6>
<p>After the report, Government agencies were banned from using Huawei smartphones by the Prime Minister, Babis, but ordered more evidence for the accusation. Since then, a Nukib spokesperson has denied any ties or pressures from the US Government regarding the decision against Huawei; citing, &#8220;it surprised the US authorities as much as it surprised Huawei.&#8221;</p>
<p><figure id="attachment_295925" aria-describedby="caption-attachment-295925" style="width: 1238px" class="wp-caption aligncenter"><img loading="lazy" class="wp-image-295925 size-full" src="https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1.png?x10805" alt="Huawei" width="1238" height="838" srcset="https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1.png 1238w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-300x203.png 300w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-768x520.png 768w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-1024x693.png 1024w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-696x471.png 696w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-1068x723.png 1068w, https://www.gizmochina.com/wp-content/uploads/2019/12/Screenshot-42-1-620x420.png 620w" sizes="(max-width: 1238px) 100vw, 1238px" /><figcaption id="caption-attachment-295925" class="wp-caption-text">Czech Republic&#8217;s Cybersecurity Chief, Dusan Navratil</figcaption></figure></p>
<p>It is still unclear if the dismissal of the Navratil is based on his allegations against Huawei, which is expanding in Europe to better take on its western competitors. According to Cui Hongjian, the director of China Institute of International Studies think tank, Huawei has been in a chaotic position in the Czech Republic which is also indicative of the broader trend in Europe regarding the company and 5G networking as a whole.</p>
<h6 class="related"><strong>UP NEXT: <a href="https://www.gizmochina.com/2019/12/18/samsung-offers-attractive-discounts-on-s10-note-10-and-a-series-to-celebrate-10-years-of-galaxy-lineup/">Samsung offers attractive discounts on S10, Note 10 and A-series to celebrate 10 years of Galaxy lineup</a></strong></h6>
<p>&nbsp;</p>
<p>(<a href="https://www.scmp.com/news/china/diplomacy/article/3042473/czech-cybersecurity-chief-fired-amid-dispute-over-huawei" target="_blank" rel="noopener noreferrer">Source</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2019/12/18/disputes-over-huawei-security-threats-leads-to-czechs-cybersecurity-chief-being-fired/">Disputes over Huawei security threats leads to Czechs Cybersecurity Chief being fired</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Huawei says it won&#8217;t grant Chinese government&#8217;s requests to open “back doors” in foreign telecoms networks</title>
		<link>https://www.gizmochina.com/2019/02/26/huawei-says-it-wont-grant-chinese-governments-requests-to-open-back-doors-in-foreign-telecoms-networks/</link>
		
		<dc:creator><![CDATA[Habeeb Onawole]]></dc:creator>
		<pubDate>Tue, 26 Feb 2019 23:49:58 +0000</pubDate>
				<category><![CDATA[Huawei]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.gizmochina.com/?p=238356</guid>

					<description><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-300x169.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="huawei" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-300x169.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-768x432.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1.jpg 991w" sizes="(max-width: 300px) 100vw, 300px" /><p>Huawei had a press event in Canada last week where its chairman tried to allay the fears associated with its 5G technology. Chairman Liang Hua said there is no law that forces companies to create “back doors” in their networks. He added that Huawei hasn&#8217;t received any request to do so and even if they [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2019/02/26/huawei-says-it-wont-grant-chinese-governments-requests-to-open-back-doors-in-foreign-telecoms-networks/">Huawei says it won&#8217;t grant Chinese government&#8217;s requests to open “back doors” in foreign telecoms networks</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img width="300" height="169" src="https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-300x169.jpg?x10805" class="webfeedsFeaturedVisual wp-post-image" alt="huawei" loading="lazy" style="display: block; margin: auto; margin-bottom: 5px;max-width: 100%;" link_thumbnail="" srcset="https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-300x169.jpg 300w, https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1-768x432.jpg 768w, https://www.gizmochina.com/wp-content/uploads/2018/12/file-photo-a-woman-walks-by-a-huawei-logo-at-a-shopping-mall-in-shanghai-1.jpg 991w" sizes="(max-width: 300px) 100vw, 300px" /><p><a href="http://gizmochina.com/tag/huawei">Huawei</a> had a press event in Canada last week where its chairman tried to allay the fears associated with its 5G technology.</p>
<p>Chairman Liang Hua said there is no law that forces companies to create “back doors” in their networks. He added that Huawei hasn&#8217;t received any request to do so and even if they did, they would refuse to do it snce it is unlawful.</p>
<p><img loading="lazy" class="aligncenter size-full wp-image-236959" src="https://www.gizmochina.com/wp-content/uploads/2019/02/huawei-logo-featured.png?x10805" alt="huawei-logo-featured" width="720" height="420" srcset="https://www.gizmochina.com/wp-content/uploads/2019/02/huawei-logo-featured.png 720w, https://www.gizmochina.com/wp-content/uploads/2019/02/huawei-logo-featured-300x175.png 300w" sizes="(max-width: 720px) 100vw, 720px" /></p>
<p>Mr. Hua told reporters that he leads “an independent business organization” and they “have kept a good track record on cybersecurity”.</p>
<p>Huawei is trying to renew trust in its technology as the US and its allies have/considering placing a ban on using the Chinese giant&#8217;s technology to build their 5G networks. Huawei is not only a phone manufacturer but also a telecommunications company that develops the hardware used in communication towers and related communications technology infrastructure.</p>
<p>China&#8217;s security laws actually require that organizations will cooperate with the government for intelligence work. This has raised fears that the Chinese government can request Huawei to create a vulnerability in the networks it develops for other countries. The chairman confirmed the law does exist but said it does not require it to open up a back door so that communication can be monitored.</p>
<p>Countries like the US and Australia have already issued bans to Huawei from 5G networks but some such as Germany have said an outright ban on Huawei isn&#8217;t legally viable but approved companies will have to meet a high level of security standards. The UK is yet to decide.</p>
<p style="text-align: center;"><span style="color: #ff0000;">READ MORE:</span> <a href="https://www.gizmochina.com/2019/02/24/huawei-mate-x-worldss-fastest-thinnest-and-most-expensive-5g-foldable-phone/">Huawei Mate X: Worlds’s fastest, thinnest, and most expensive 5G foldable phone</a><span id="more-238356"></span></p>
<p>Huawei says it will continue to invest in Canada and even if it is banned from providing 5G services, there are still customers that will choose them and they will continue to provide good service to the customers.</p>
<p>(<a href="https://www.bloomberg.com/news/articles/2019-02-21/huawei-not-obliged-to-open-back-doors-for-china-chair-says">Source</a>)</p>
<p>The post <a rel="nofollow" href="https://www.gizmochina.com/2019/02/26/huawei-says-it-wont-grant-chinese-governments-requests-to-open-back-doors-in-foreign-telecoms-networks/">Huawei says it won&#8217;t grant Chinese government&#8217;s requests to open “back doors” in foreign telecoms networks</a> appeared first on <a rel="nofollow" href="https://www.gizmochina.com">Gizmochina</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 137/281 objects using Redis
Page Caching using Disk: Enhanced 
Content Delivery Network Full Site Delivery via cloudflare
Database Caching 14/49 queries in 0.014 seconds using Redis
Fragment Caching 2/3 fragments using Redis

Served from: www.gizmochina.com @ 2026-03-26 04:05:15 by W3 Total Cache
-->