ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
Hot torrents
View Torrent Info: The.Disappointments.Room.2016.DVDRip.XviD.AC3-EVO
View Torrent Info: All.We.Had.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Burn Country.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Frank.And.Lola.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Finding.Dory.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Finding.Nemo.2003.BluRay.720p.DTS.AC3.AAC.x264-ETRG
View Torrent Info: Hillsong.Let.Hope.Rise.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: The Light Between Oceans (2016) 720p WEB-DL - 1.2GB - ShAaNiG
Hot torrents
View Torrent Info: The.Grand.Tour.S01E04.WEBRip.X264-DEFLATE[ettv]
View Torrent Info: DCs.Legends.of.Tomorrow.S02E08.HDTV.x264-LOL[ettv]
View Torrent Info: Supernatural.S12E08.HDTV.x264-FUM[ettv]
View Torrent Info: Pure.Genius.S01E07.HDTV.x264-KILLERS[ettv]
View Torrent Info: Housefull 3 (2016) HQ 1080p Blu-Ray x264 DTSHD-MA 7.1 MSubs -DDR
View Torrent Info: AE DIL HAI MUSHKIL (2016) HEVC x265 10 Bits DvDRip AAC 5.1 ESub -DDR
View Torrent Info: Madaari (2016) 1080p Blu-Ray HEVC 10 Bits AC3 5.1 ESub -DDR
View Torrent Info: The Devil\'s Double (2011) 720p BluRay x264 Eng Subs [Dual Audio] [Hindi DD 2.0 - English 2.0] Exclusive By -=!Dr.STAR!=-
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Huawei Proved Full of Vulnerabilities

Huawei Proved Full of Vulnerabilities

Huawei Proved Full of Vulnerabilities

Added: Thursday, August 9th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
One of the German security researchers found out that the routers of telecom company Huawei were full of exploits.

Felix Lindner, a security researcher, explained that the routers were relatively cheap if compared to its competitors on the market, and they therefore were rapidly becoming popular across the world. He revealed that Huawei VRP routers used 1990s-style code, which means that the hackers could use known vulnerabilities in order to open up systems and effectively act as administrators.

Answering the allegation that Huawei intentionally included backdoors in its equipment, the researcher dismissed the idea, saying that they simply didn’t need to. Indeed, all you need is to have Huawei people running your network or help run your network. In fact, if you have so many vulnerabilities, they can become the best form of attack vector.

Regardless of the Huawei’s attempts to ease American paranoia about its equipment being part of a China-sponsored coup, it looks like the telecom company will always arouse suspicion. Anyway, whatever their intentions are, at the moment Huawei and the other Chinese networking giant, ZTE, have to put up with a stigma that has been nailed to them by the Europe.

Despite the fact that the allegations weren’t about national security, the Commerce Ministry of China has recently felt compelled to stick up for Huawei and ZTE, against the European Union. In the meantime, Mike Rogers, the US House of Representatives’ Intelligence Committee panel chairman, publicly expressed worries that Huawei and ZTE equipment could be developed with the purpose of stealing data or establishing the very ability to run online attacks. In addition, he believes the local government provides subsidies to let the equipment be sold cheaper.

In response, a spokesperson for Huawei in the United Stats, when asked about the exploits, told in the interview that the company is aware of the media reports on security exploits in some small Huawei routers, and is currently busy with verifying these claims. The company claims to be adopting rigorous security strategies and policies to protect the network security of its clients and abides by industry standards and best practices in security risk and incident management.

August 9th,2012

Posted by: 

Date:  Thursday, August 9th, 2012

Comments (7) (please add your comment »)

posted by (2012-08-09 20:25:23)
ciance avatarhorse shht! Those back doors were there on purpose. Follow the trail I bet it ends with a diaper head squatting in the dirt in Pakistan.

posted by (2012-08-10 02:14:32)
No avatarOr some guy scarfing down chicken kung pow. these people are beyond ridiculous.

posted by (2012-08-10 02:21:46)
ic3m4l3 avatarwell cnsidering hawaii/zte mobile internet dongles can be hacked/unlocked them having exploits is not h ard to imagine

posted by (2012-08-10 15:36:14)
No avatardon't really matter how the router is built or how many security features it has, if a hacker wants in....they WILL get in. talked to a buddy of mine and he told just how easy it is to hack in to a router IF you know what you are doing. not gona go in to the details but it IS completely possible.

posted by (2012-08-10 23:10:07)
No avatarThe fundamentals of mathematics mean EVERYTHING in a solid unmoving state is hackable. with the revolving code mechanisms a quantum computer may be needed to hack the bank b4 the codes are changed again in the morning but otherwise it could happen to any router at all. Just because the codes are old doesn't mean that the new ones are anymore secure. Your friend is totally right clamo. It's a universal principle of our existence WE CANNOT HIDE ANYTHING..

posted by (2012-08-11 12:39:07)
ic3m4l3 avatara virgin media box u cant hack,, the security keys change evry 30 seconds so if u do then its only for 30 seconds!
aint technoology sh1t

posted by ET loverSuperman (2012-08-12 11:36:31)
tonymengela avatar@ DON that may be true but once you hack it you can run a virtual code to make the box think it is changing codes when in fact it is not. Even though it is some what more hardware based, it has to has a diagnostic setting and software can rewrite all the settings. Security is just a mirage, anything that has been built and sold was designed with an entrance and exit, hacking is just finding it.

Articles Search
Most Popular Stories
Articles Categories
Articles Tags

Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc5