Tuesday, 09 July 2019 08:50

GSA says 25 5G smartphones announced so far, nine already on sale

By
Rate this item
(0 votes)
GSA says 25 5G smartphones announced so far, nine already on sale Pixabay

Twenty-five 5G smartphones have been announced and at least nine are now commercially available, the Global Mobile Suppliers Association says in its report for June.

These include the LG V50 ThinQ 5G Enabled, the Samsung Galaxy S10 5G Enabled and the OPPO Reno 5G.

The organisation said 26 new %G devices had been added to the GSA analyser for mobile broadband devices database in June, which meant there were now 90 announced devices not including regional variants and prototypes which were not going to be sold commercially.

It said the number of devices being announced had grown rapidly in the first half of 2019, starting with a few and then increasing rapidly as 5G networks were launched in different countries.

At present the database includes the following:

  • a total of 13 announced form factors (phones, hotspots, indoor CPE, outdoor CPE, laptops, modules, snap-on dongles/adaptors, enterprise routers, IoT routers, drones, a switch, a USB terminal and robot).
  • a total of 39 vendors who had announced available or forthcoming 5G devices, including sub-brands separately (plus four in partnership with Sunsea).
  • a total of 90 announced devices, up from 33 at the end of March (excluding regional variants, re-badged devices, phones that can be upgraded using a separate adaptor, and prototypes not expected to be commercialised).
  • a total of 25 phones (plus regional variants); at least nine of which are now commercially available.
  • seven hotspots (plus regional variants); at least three of which are now commercially available.
  • twenty-three CPE devices (indoor and outdoor, including two Verizon-spec compliant devices), at least eight of which are now believed to be commercially available.
  • twenty-three modules.
  • two snap-on dongles/adaptors.
  • two routers.
  • two IoT routers.
  • two drones.
  • one laptop.
  • one switch.
  • one USB terminal.
  • one robot.

BUSINESS WORKS BETTER WITH WINDOWS 1O. MAKE THE SHIFT

You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer

Timezones

QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.

REGISTER!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Related items

  • ANU team develops new self-healing hydrogel

    Scientists from the Australian National University claim to have invented a new hyrdogel that operates like skin, ligaments and bone, and is very strong, self-healing and able to morph into different shapes.

    A statement from the team said their discovery could lead to a class of medical implants or artificial muscles for next-generation robots that were able to swim. Their research was published in the journal Advanced Materials.

    Hydrogels contain a high content of water and are used in products like contact lenses.

    Lead senior researcher Associate Professor Luke Connal from the ANU Research School of Chemistry said the dynamic chemical bonds in the new gel gave it unique features.

    {loadposition sam08}“With the special chemistry we’ve engineered in the hydrogel, it can repair itself after it has been broken like human skin can,” he said.

    “Hydrogels are usually weak, but our material is so strong it could easily lift very heavy objects and can change its shape like human muscles do. This makes our hydrogel suitable for artificial muscles in what we call soft robotics.

    new skin strong

    The new jelly material is very strong and can heal itself like skin. Supplied

    “Our hydrogel’s ability to self-heal, as well as its flexibility and strength, make it an ideal material for wearable technology and various other biomedical devices.”

    Dr Zhen Jiang, a co-researcher and post-doctoral fellow, said the shape of the hydrogel could be changed by a form of temperature control, allowing it to perform as an artificial muscle.

    “In a lot of science fiction movies, we see the most challenging jobs being done by artificial humanoid robots. Our research has made a significant step towards making this possible,” he said.

    Dr Jiang got the idea for the new hydrogel from one of his doctoral projects.

    “We anticipate that researchers working on the next-generation of soft robots will be interested and excited about our new way of making hydrogels,” he said.

    The team can make the hydrogel with simple and scalable chemistry and plan to develop a 3D printable ink based on it.

  • Optus, Seven Network team up on Tokyo Olympics broadcast deal

    The Seven television network has teamed up with Optus to develop a channel featuring Seven’s coverage of Tokyo 2020 in 4K Ultra HD, which will be exclusively available to Optus 5G Home customers via Fetch.

    Describing the as “an experience which will deliver unmatched streaming picture quality across a live linear channel”, Seven West Media Chief Revenue Officer, Kurt Burnette, said, “this will be the most-watched Olympics and the biggest digital event in Australian streaming history.”

    “Seven’s coverage of the Olympics will be unprecedented, and with time zones differing by only one-hour, Tokyo 2020 will feel like a home Games for Australians.

    “As our Australian athletes go for gold, Seven will be supporting them every step of the way, and through an exclusive partnership with Optus we will be able to deliver live event coverage in 4K Ultra HD exclusively to Optus 5G Home customers with Fetch Mighty set top boxes.”

    {loadposition peter}Optus VP Product Development, TV and Content, Clive Dickens, said: “A partnership with Seven will allow us to showcase the Olympic Games Tokyo 2020 in 4K Ultra HD for the first time over a 5G network in Australia to Fetch Mighty customers.”

    “This exclusive partnership is another element of our 5G ‘Video Experience Network’ which will allow us to ensure end-to-end delivery of 4K Ultra HD Video content to exclusive Optus customers.

    “Australian’s appetite for 4K Ultra HD Video content is growing with anticipation following the launch of Optus 5G and we continue to work with premium Video On Demand content partners to build out their 4K Ultra HD offerings.”

    Fetch CEO, Scott Lorson, said: “Australians love their sport, and many have invested heavily in-home theatre systems to ensure the biggest and best possible viewing experience. The Olympic games represents the pinnacle in sports viewing, and Seven is set to provide unprecedented access during the 3 weeks of the Olympic Games.”

    “As a result of this partnership, Optus subscribers with a Fetch Mighty will be in for a special treat, with access for the first time ever to a 4K Ultra HD channel streaming Seven's coverage of the Olympics. We are delighted to work with Optus and Seven on this ground-breaking initiative."

    With over 300 5G sites currently in Sydney, Canberra, Adelaide, Brisbane, Melbourne, Perth and other key locations in NSW, Victoria and Queensland and 1200 sites planned by March 2020, Optus recently launched 5G in the home and on the mobile.

  • Indonesia tops global smartphone market growth with 11.3 million shipments in Q3

    Smartphone shipments in Indonesia are growing the fastest among the world’s top 10 global smartphone markets, reaching 11.5 million shipments and growing 29% annually in Q3 2019.

    According to the report from analyst firm Canalys, Russia came second with a 15% year-on-year growth, while Oppo solidified its lead by growing 47% annually with 2.6 million smartphone shipments.

    And second-placed Xiaomi recorded 2.5 million units and a 22% year-on-year growth, “regaining momentum after a stagnant performance in the first two quarters of 2019”.

    Canalys also reported that Samsung, the only non-Chinese vendor in the top five, dropped to third place and shipped 2.4 million smartphones with a 16% year-on-year growth - with Vivo and Realme completing the top five by shipping 1.9 million units and 1.3 million units respectively.

    {loadposition peter}“Chinese vendors are investing heavily in Indonesia,” said Matthew Xie, Canalys Analyst.

    “Suffering from the intense competition pressure in their home court (see Canalys press release 30 October 2019 Canalys: Huawei grows 66% in China smartphone market at expense of competition), Oppo, Vivo and Xiaomi are eager to make up lost ground through overseas expansion.

    “Indonesia, the world’s fourth largest smartphone market, is still showing a lot of potential, thanks to the country’s vast young population and relatively low smartphone penetration. Stabilization of the Rupiah against the US Dollar in 2019 also strengthens foreign vendor’s investment confidence.”

    Xie notes that Oppo topped the market for the second consecutive quarter, with the vendor has registering “stellar growth in the past three quarters thanks to its low-end products such as A5s and A1K, which contributed 65% of total shipments in Q3”.

    “Indonesia is the second biggest market for Oppo outside China, contributing 8% of its global shipments. To compete in the market against long-term champion Samsung, Oppo aggressively increased investments in its offline channel developments,” said Xie.

    “Oppo re-organized and rapidly expanded the size of its local sales team, and increased the number of retail stores to a wider geographical coverage. Besides having comprehensive offline coverage, Oppo’s mid-to-low end portfolio had an aggressive price-to-spec ratio to address local market competition. It gave the vendor a strong short-term boost, but the overreliance on low-end could backfire on their brand image in the mid-to-high end in the future.”

  • New Chrome plugin to detect privacy risk on websites

    Ahead of the holiday season, cloud application security firm Instart has released a plugin for the Chrome browser that can detect if card-skimming or other privacy violating code has been inserted into a site.

    The plugin is called Privacy Alert and is available from the Chrome Web store. It will warn users if personal data is at potential risk of being stolen when they log in to a website.

    A pop-up will appear on the right-hand top corner of any Web page when there is a chance that data theft may occur.

    A statement from the company said: "“Over the past couple of years, businesses have made headlines for falling victim to these eSkimming attacks, such as those perpetrated by the hacking group Magecart.

    {loadposition sam08}“British Airways and TicketMaster are just two of many recent examples. As a result of these two breaches, attackers gained access to credit card numbers and other account details from hundreds of thousands of customers, and in the case of British Airways, they have been handed fines of over US$200 million for failing to protect their customers’ data.

    privacy alert

    "Privacy Alert will alert you if it detects that third-party sources access or have the ability to access the private information that you enter into form fields or is stored in cookies, allowing you to decide if you feel safe continuing to provide the website with your information," the statement added.

  • Man-in-the-middle attack used to steal money sent from VC to start-up

    Researchers at security firm Check Point have managed to track down the perpetrator(s) of a man-in-the-middle attack that was used to steal money sent from a venture capital firm in China to a start-up in Israel.

    A blog post by Matan Ben David, an incident response analyst at the Israel-based company, said the Chinese venture capital firm was alerted by their bank that there was an issue with a wire transaction.

    "A few days later, a young Israeli start-up realised they didn’t receive their US$1 million seed funding. Both sides got on the phone and quickly realised that their money was stolen," he wrote.

    "Once both sides realised the money was gone, they also noticed something strange with the emails between the two parties, as some of the emails were modified and some were not even written by them."

    {loadposition sam08}The task of tracking down the attack was made more difficult by the fact that the customer's mailboxes were hosted on GoDaddy and showed only the five last logins to the server. The head of the Israeli start-up engaged Check Point to investigate.

    Apart from the lack of logs, Check Point's investigators also had to reckon with the fact that all emails relating to the transaction had been deleted and only screenshots were available from mobile accounts. A third factor that complicated things was the lack of any direct communication with the Chinese company involved.

    "We realised that if the user account was compromised on the Israeli side, we probably wouldn’t be able to determine the exact times the attacker was logged in or which IP was used," Matan said.

    "We had to track down the original emails so we could investigate the email headers. As we only had screenshots (from a mobile) of the emails in question, we decided to collect the mailbox archives from all the people that were CC’ed in the original thread. By searching for keywords from the screenshots, we were able to locate the original emails."

    With these emails, the Check Point team was able to discover that the attacker had probably gained knowledge of the impending transaction from an email thread and registered two lookalike domains. In a normal case of business email compromise, the attacker tends to monitor emails by adding forwarding rules.

    Matan pointed out that one of lookalike domains had essentially the same name as the Israeli start-up, but included an additional "s" at the end. Similarly, the second lookalike domain closely resembled that of the Chinese VC company, but once again added an "s" at the end.

    "The attacker then sent two emails with the same headline as the original thread. The first email was sent to the Chinese VC company from the Israeli lookalike domain spoofing the email address of the Israeli startup’s chief executive," Matan explained.

    "The second email was sent to the Israeli start-up from the lookalike Chinese VC company domain, spoofing the VC account manager who handled this investment."

    After this, every email sent by each side was in reality sent to the attacker, who then reviewed the email, decided if any content needed to be edited, and then forwarded the email from the relevant lookalike domain to its original destination.

    Matan said the attacker appeared to have had great patience and was also very experienced. "At one point during the attack, the Chinese account owner and the CEO of the Israeli start-up scheduled a meeting in Shanghai," he pointed out. "At the last moment, the attacker sent an email to both sides cancelling the meeting, providing a different excuse for why they couldn’t meet to each."

    He said that, had the meeting taken place, then there would have been suspicions about the changes in the emails. "Without this crucial act from the attacker’s side, the whole operation would probably have failed. It’s reasonable to expect that during the meeting, the account owner would be asked to verify the bank account changes that were made," Matan said.

    The brazenness of the attacker was underlined by the fact that he/she did not stop with this. "Instead of cutting all lines of communication after such a heist, the threat actor(s) did not cease their efforts but tried to go after another round of the VC investment," Matan wrote.

    "And if that wasn’t enough, even after the attack was remediated, the Israeli CFO continues to receive one email every month from the spoofed CEO account, asking him to perform a wire transaction."

    Matan said Check Point had learned a great deal from the experience, listing the following points:

    • "Automatically prevent – Email is by far the number one vector for attackers to infiltrate business networks. Phishing emails baiting users to expose their organization credentials or to click on a malicious link/file are the number one threat in the email space. Organizations must always incorporate an email security solution, designed to prevent such attacks automatically utilizing continuously updated security engines.
    • "Educate your employees – On top of that, proper and ongoing education of employees to the trending threat in the email space.
    • "When dealing with wire transfers, always make sure to add a second verification by either calling the person who asked to make the transfer or calling the receiving party.
    • "Ensure your email infrastructure is able to keep audit & access logs for at least six months. In startup mode, it’s easy to quickly build infrastructure with security and logging dealt with only as an after-thought.
    • "Always capture as much forensic evidence as possible when dealing with suspected or confirmed cyber security incidents. Deleting a piece of evidence only assists the attacker. Timely evidence captures when the incident occurs can also insure important logs and evidence are not overwritten.
    • "Leverage a tool to identify newly registered domains that are look-alikes to your own domain name."

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments