Huawei Proved Full of VulnerabilitiesAdded: Thursday, August 9th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
One of the German security researchers found out that the routers of telecom company Huawei were full of exploits.
Felix Lindner, a security researcher, explained that the routers were relatively cheap if compared to its competitors on the market, and they therefore were rapidly becoming popular across the world. He revealed that Huawei VRP routers used 1990s-style code, which means that the hackers could use known vulnerabilities in order to open up systems and effectively act as administrators.
Answering the allegation that Huawei intentionally included backdoors in its equipment, the researcher dismissed the idea, saying that they simply didn’t need to. Indeed, all you need is to have Huawei people running your network or help run your network. In fact, if you have so many vulnerabilities, they can become the best form of attack vector.
Regardless of the Huawei’s attempts to ease American paranoia about its equipment being part of a China-sponsored coup, it looks like the telecom company will always arouse suspicion. Anyway, whatever their intentions are, at the moment Huawei and the other Chinese networking giant, ZTE, have to put up with a stigma that has been nailed to them by the Europe.
Despite the fact that the allegations weren’t about national security, the Commerce Ministry of China has recently felt compelled to stick up for Huawei and ZTE, against the European Union. In the meantime, Mike Rogers, the US House of Representatives’ Intelligence Committee panel chairman, publicly expressed worries that Huawei and ZTE equipment could be developed with the purpose of stealing data or establishing the very ability to run online attacks. In addition, he believes the local government provides subsidies to let the equipment be sold cheaper.
In response, a spokesperson for Huawei in the United Stats, when asked about the exploits, told in the interview that the company is aware of the media reports on security exploits in some small Huawei routers, and is currently busy with verifying these claims. The company claims to be adopting rigorous security strategies and policies to protect the network security of its clients and abides by industry standards and best practices in security risk and incident management.
August 9th,2012Posted by:
Thursday, August 9th, 2012
|posted by (2012-08-09 20:25:23)|
|horse shht! Those back doors were there on purpose. Follow the trail I bet it ends with a diaper head squatting in the dirt in Pakistan.|
|Or some guy scarfing down chicken kung pow. these people are beyond ridiculous.|
|posted by (2012-08-10 02:21:46)|
|well cnsidering hawaii/zte mobile internet dongles can be hacked/unlocked them having exploits is not h ard to imagine|
|posted by (2012-08-10 15:36:14)|
|don't really matter how the router is built or how many security features it has, if a hacker wants in....they WILL get in. talked to a buddy of mine and he told just how easy it is to hack in to a router IF you know what you are doing. not gona go in to the details but it IS completely possible.|
|The fundamentals of mathematics mean EVERYTHING in a solid unmoving state is hackable. with the revolving code mechanisms a quantum computer may be needed to hack the bank b4 the codes are changed again in the morning but otherwise it could happen to any router at all. Just because the codes are old doesn't mean that the new ones are anymore secure. Your friend is totally right clamo. It's a universal principle of our existence WE CANNOT HIDE ANYTHING..|
|posted by (2012-08-11 12:39:07)|
|a virgin media box u cant hack,, the security keys change evry 30 seconds so if u do then its only for 30 seconds!|
aint technoology sh1t
|@ DON that may be true but once you hack it you can run a virtual code to make the box think it is changing codes when in fact it is not. Even though it is some what more hardware based, it has to has a diagnostic setting and software can rewrite all the settings. Security is just a mirage, anything that has been built and sold was designed with an entrance and exit, hacking is just finding it.||
Most Popular Stories