Tuesday, 09 July 2019 08:50

GSA says 25 5G smartphones announced so far, nine already on sale

By
Rate this item
(0 votes)
GSA says 25 5G smartphones announced so far, nine already on sale Pixabay

Twenty-five 5G smartphones have been announced and at least nine are now commercially available, the Global Mobile Suppliers Association says in its report for June.

These include the LG V50 ThinQ 5G Enabled, the Samsung Galaxy S10 5G Enabled and the OPPO Reno 5G.

The organisation said 26 new %G devices had been added to the GSA analyser for mobile broadband devices database in June, which meant there were now 90 announced devices not including regional variants and prototypes which were not going to be sold commercially.

It said the number of devices being announced had grown rapidly in the first half of 2019, starting with a few and then increasing rapidly as 5G networks were launched in different countries.

At present the database includes the following:

  • a total of 13 announced form factors (phones, hotspots, indoor CPE, outdoor CPE, laptops, modules, snap-on dongles/adaptors, enterprise routers, IoT routers, drones, a switch, a USB terminal and robot).
  • a total of 39 vendors who had announced available or forthcoming 5G devices, including sub-brands separately (plus four in partnership with Sunsea).
  • a total of 90 announced devices, up from 33 at the end of March (excluding regional variants, re-badged devices, phones that can be upgraded using a separate adaptor, and prototypes not expected to be commercialised).
  • a total of 25 phones (plus regional variants); at least nine of which are now commercially available.
  • seven hotspots (plus regional variants); at least three of which are now commercially available.
  • twenty-three CPE devices (indoor and outdoor, including two Verizon-spec compliant devices), at least eight of which are now believed to be commercially available.
  • twenty-three modules.
  • two snap-on dongles/adaptors.
  • two routers.
  • two IoT routers.
  • two drones.
  • one laptop.
  • one switch.
  • one USB terminal.
  • one robot.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Related items

  • Viettel, Nokia team up on Vietnam’s first 5G broadcast

    Vietnam’s largest mobile network operator Viettel and Nokia have broadcast the first end-to-end 5G network in Ho Chi Minh City which they say positions Vietnam head to head with other countries in the region looking for an early commercial 5G rollout.

    Viettel and Nokia also say that being first to 5G will allow Viettel and Nokia to play a crucial role in enabling Industry 4.0 applications to boost Vietnam's economy.

    Nokia says it deployed the 5G network in a very short time frame, building on its existing LTE footprint with the operator, upgrading the entire infrastructure from radio access, cloud Packet Core and transmission to 5G technology.

    Viettel’s first cloud-based Packet Core network is currently serving its live subscribers, and the network will offer a range of real-time 5G end-user experiences, such as VR gaming and 8K resolution streaming, as well as enabling Nokia’s Fixed Wireless Access.

    {loadposition peter}Viettel and Nokia say they have set up 10 5G base stations in the area of Ward 12, District 10, Ho Chi Minh City, Vietnam's biggest city with more than 2,000 km2 and a population of 13 million – and the project sets the basis for a comprehensive evaluation of the band, coverage and application of 5G before commercialisation in 2020.

    Tao Duc Thang, Deputy General Director of Viettel's Industry - Telecommunications Group, said, “The official broadcast of 5G in Ho Chi Minh City is an important milestone in Viettel’s strategy to make Vietnam one of the first countries in the world to commercialize 5G services. With 5G, Vietnam will go along with the world."

    “This trial demonstrates Nokia’s end-to-end 5G expertise and delivery capabilities in the Viettel network,” said Nguyen Kim Dung, head of Customer Business Team at Nokia Vietnam.

    “As a trusted supplier to the operator, we are looking forward to making 5G a commercial reality that opens enormous growth opportunities for Vietnam."

  • ownCloud, Securosys enable encryption through hardware security modules

    Open-source file syncing and sharing software company ownCloud has tied up with Swiss IT security vendor Securosys SA to offer integration of hardware security modules when encrypting and decrypting files.

    A statement from ownCloud said this would ensure that the master key for decrypting files would always remain on the module and during the exchange only the sender and recipient could access the file in question.

    Additionally, the integration of hardware security modules meant that even sysadmins could be excluded from being able to decrypt files at rest. This could be achieved by storing the master on a hardware device, with special algorithms ensuring that the key could not be accessed.

    The company said that organisations looking for secure storage should take into account the possibility that a malicious sysadmin could gain access to their data.

    {loadposition sam08}Integrating hardware security modules into the encryption and decryption process opened up another secure option for using private cloud technology in data-critical scenarios by allowing access to files by transmitting individual file keys to the module. These keys would be decrypted only inside the device using the master key.

    Decrypted file keys were transmitted back to the ownCloud application server and a process inside the ownCloud application decrypted the actual files by using the corresponding decrypted file keys and then provided the decrypted files to users.

    There would be no way for a sysadmin to read any content as long as the ownCloud application server's integrity was intact.

    "Usually, encryption at rest solutions have a distinct disadvantage in regards of performance: any encryption operation normally needs cycles and makes ownCloud slower," the company said.

    "For example, if you share 20,000 files with another user, a lot of keys must be added to the system and decryption and encryption of file keys must happen. For each file, a call to the hardware security module is needed."

    It said this problem had been overcome through development of an enterprise-grade hardware security module solution by Securosys. "With their transaction throughput, load-balancing, and high-availability capabilities, the hardware security modules keep up with the demand of big organisations."

  • New group using Windows malware to attack Saudi targets: claim

    A hitherto unknown group that has been dubbed Tortoiseshell is using both customised and common Windows malware to target IT providers in Saudi Arabia, the American security firm Symantec claims, adding that these attacks appear to be focused on the supply chain and ultimately aimed at the providers' customers.

    The company said in a blog post that the group had been active at least since July 2018 and that it had identified 11 organisations which had come under attack.

    Symantec's blog post comes a few days after Saudi Arabian oil installations came under attack, allegedly by Iranian missiles.

    Though no attribution was made regarding Tortoiseshell, Symantec mentioned that tools associated with APT34 [aka OilRig or Crambus], an actor that has been associated with Iran, had been used by Tortoiseshell.

    {loadposition sam08}In two of the affected organisations, Symantec said there were indications that the attackers had gained domain admin-level access.

    The custom tool used was malware known as Backdoor.Syskit, a backdoor that had been developed using Delphi and .NET. Apart from this, common attack tools like two versions of Infostealer and get-logon-history.ps1 were also used by Tortoiseshell, Symantec claimed.

    "The initial infection vector used by Tortoiseshell to get onto infected machines has not been confirmed, but it is possible that, in one instance, a Web server was compromised to gain access by the attacker," the Symantec post said.

    "For at least one victim, the first indication of malware on their network was a Web shell. This indicates that the attackers likely compromised a Web server, and then used this to deploy malware onto the network."

    The post said IT providers were a profitable source when it came to attacks, as they often had high-level access to clients' computers. This meant that the networks of the clients were open to infiltration without having to be compromised.

    In June, Symantec claimed that a well-known attack group known as Turla, Snake or Waterbug appeared to have hijacked and used the infrastructure of APT34.

    And in March, Symantec posted details about a group it called Elfin or APT33 which it said had been attacking organisations in the US and Saudi Arabia.

  • Sites hit by card-skimming being re-used for malicious activity

    Sites that have been decommissioned due to attacks by the card-skimming attack group Magecart are being hijacked and re-used for other malicious activity once they come back online by a secondary group of cyber criminals, the security firm RiskIQ claims.

    A study by RiskIQ, which has been tracking the Magecart group for some time, said the secondary actors were aware that breached websites were still likely to be communicating with domains that were once used for skimming and exfiltrating credit card data.

    These sites were bought by the secondary group and then used for malvertising or other threat activity, RiskIQ said.

    "The challenge with these domains is that many website owners were never aware of an active skimmer threat on their site in the first place," RiskIQ threat researcher Yonathan Klijnsma said.

    {loadposition sam08}"And unfortunately, once these malicious domains come back online, bad actors can pick up where the original skimmer left off with the intention of monetisation."

    In the last 12 monthsm British Airways has been claimed to be the most prominent business hit by Magecart. Other victims include Forbes magazine and online retailer Newegg.

    The RiskIQ study includes details on the following:

    • The lifecycle of a malicious domain;
    • How bad actors take advantage of old Magecart domains;
    • How bad actors hijack JavaScript injections for monetisation
    • How to read subtle WHOIS changes that indicate a takeover; and
    • Tips for site owners to maintain visibility into the code on their site.
  • Windows ransomware WannaCry still spreading, but the kick has gone

    The infamous ransomware WannaCry, which burst on to the world stage in May 2017, is still very much alive and infecting Windows PCs, but a zipped portion appears to have gotten corrupted, preventing its encryption and ransom note creation components from working.

    Noting this, the security firm Sophos said in a detailed paper released on Wednesday that unpatched Windows PCs were still providing a welcome for WannaCry which was crafted using the leaked NSA exploit, EternalBlue.

    Sophos researchers Peter Mackenzie, Fraser Howard and Anton Kalinin said that more than 12,000 variants of what is arguably the most famous ransomware had been discovered.

    WannaCry was stopped in its tracks when British security researcher Marcus Hutchins registered a domain he had found in its source code; the malware had been programmed to check this domain, and continue spreading if it could not access the domain.

    {loadposition sam08}The Sophos trio said that more than five million WannaCry attacks had been blocked in the last three months of 2018, as detected by the company's software.

    They also found that about 97% of the Windows PCs that came under attack were running Windows 7, adding "so this is not just a story about forgotten Windows XP devices".

    kevin wannacry tweet

    WannaCry has three elements – the worm part which enables it to spread without any vector, the kill switch, and the ransomware part which is a zipped archive.

    Many of the variants that were encountered by the Sophos researchers had the kill switch disabled and skipped over to the last part of the ransomware. But as the zipped archive had been corrupted, the expected function did not run to completion, something mentioned by British security researcher Kevin Beaumont.

    Mackenzie, Howard and Kalinin said that this behaviour had been noted as early as two days after the initial breakout — 12 May 2017 — with French researcher Matt Suiche confirming this from a sample that had been uploaded to the virus database VirusTotal by Kaspersky staffers.

    "The MD5 hash of the file uploaded to VirusTotal, which doesn’t have a kill switch and doesn’t encrypt files, is none other than the exact same file we now see causing the highest number of WannaCry detections: MD5: d724d8cc6420f06e8a48752f0da11c66," the Sophos team wrote.

    "It is number one on the of unique file variants list provided earlier, causing 29% of all WannaCry detections in our data.

    "Even more amazing is that the top three files on our list are all variants of this same file. The other two files contain the same corrupt archive; the only difference is in how the kill switch has been removed."

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments