Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Charli XCX Releases New Song “Wall of Sound”

    January 18, 2026

    Democrats think a war-powers resolution for Greenland would get more GOP votes than one on Venezuela

    January 18, 2026

    Trump accuses Tim Walz and Ilhan Omar of using ICE protests to distract from

    January 18, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»One of 5G’s Biggest Features Is a Security Minefield
    Technology

    One of 5G’s Biggest Features Is a Security Minefield

    By AdminAugust 10, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    One of 5G’s Biggest Features Is a Security Minefield


    True 5G wireless data, with its ultrafast speeds and enhanced security protections, has been slow to roll out around the world. As the mobile technology proliferates—combining expanded speed and bandwidth with low-latency connections—one of its most touted features is starting to come in to focus. But the upgrade comes with its own raft of potential security exposures.

    A massive new population of 5G-capable devices, from smart-city sensors to agriculture robots and beyond, are gaining the ability to connect to the internet in places where Wi-Fi isn’t practical or available. Individuals may even elect to trade their fiber-optic internet connection for a home 5G receiver. But the interfaces that carriers have set up to manage internet-of-things data are riddled with security vulnerabilities, according to  research that will be presented on Wednesday at the Black Hat security conference in Las Vegas. And those vulnerabilities could dog the industry long-term.

    After years of examining potential security and privacy issues in mobile-data radio frequency standards, Technical University of Berlin researcher Altaf Shaik says he was curious to investigate the application programming interfaces (APIs) that carriers are offering to make IoT data accessible to developers. These are the conduits that applications can use to pull, say, real-time bus-tracking data or information about stock in a warehouse. Such APIs are ubiquitous in web services, but Shaik points out that they haven’t been widely used in core telecommunications offerings. Looking at the 5G IoT APIs of 10 mobile carriers around the world, Shaik and his colleague Shinjo Park found common, widely known API vulnerabilities in all of them, and some could be exploited to gain authorized access to data or even direct access to IoT devices on the network.

    “There’s a big knowledge gap. This is the beginning of a new type of attack in telecom,” Shaik told WIRED ahead of his presentation. “There’s a whole platform where you get access to the APIs, there’s documentation, everything, and it’s called something like ‘IoT service platform.’ Every operator in every country is going to be selling them if they’re not already, and there are virtual operators and subcontracts, too, so there will be a ton of companies offering this kind of platform.”

    The designs of IoT service platforms aren’t specified in the 5G standard and are up to each carrier and company to create and deploy. That means there’s widespread variation in their quality and implementation. In addition to 5G, upgraded 4G networks can also support some IoT expansion, widening the number of carriers that may offer IoT service platforms and the APIs that feed them.

    The researchers bought IoT plans on the 10 carriers they analyzed and got special data-only SIM cards for their networks of IoT devices. This way they had the same access to the platforms as any other customer in the ecosystem. They found that basic flaws in how the APIs were set up, like weak authentication or missing access controls, could reveal SIM card identifiers, SIM card secret keys, the identity of who purchased which SIM card, and their billing information. And in some cases, the researchers could even access large streams of other users’ data or even identify and access their IoT devices by sending or replaying commands that they shouldn’t have been able to control.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleIn Memoriam: James Lovelock (1919-2022)
    Next Article The Completionist’s Jirard Khalil on G4, gaming and gear

    RELATED POSTS

    Jones Hovercraft 2.0 Snowboard Review: For Big Powder Days

    January 18, 2026

    Why Silicon Valley is really talking about fleeing California (it’s not the 5%)

    January 18, 2026

    Reddit Has Thoughts on Paris Hilton Cookware. So Do We

    January 17, 2026

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    Ads Are Coming to ChatGPT. Here’s How They’ll Work

    January 16, 2026

    Silicon Valley’s messiest breakup is definitely headed to court

    January 16, 2026
    latest posts

    Charli XCX Releases New Song “Wall of Sound”

    Charli XCX has shared a new song from Wuthering Heights, her soundtrack and accompaniment to…

    Democrats think a war-powers resolution for Greenland would get more GOP votes than one on Venezuela

    January 18, 2026

    Trump accuses Tim Walz and Ilhan Omar of using ICE protests to distract from

    January 18, 2026

    Ukrainian drone strikes hit Russian energy infrastructure, Zelenskyy says

    January 18, 2026

    Jones Hovercraft 2.0 Snowboard Review: For Big Powder Days

    January 18, 2026

    NASA’s Artemis II mission to the moon is inching toward the launch pad

    January 18, 2026

    Chihiro Amano: ‘It was like I hit a wall in all…

    January 18, 2026
    Categories
    • Books (1,009)
    • Business (5,914)
    • Events (29)
    • Film (5,850)
    • Lifestyle (3,960)
    • Music (5,951)
    • Politics (5,915)
    • Science (5,265)
    • Technology (5,844)
    • Television (5,528)
    • Uncategorized (6)
    • US News (5,902)
    popular posts

    25 Best Men’s Sweatpants – Look Good and Feel Cozy in 2023

    Loungewear is having its moment right now and men’s sweatpants are flying off shelves around…

    Researchers ‘cannot rule out’ bird flu spreading between sea lions

    February 14, 2023

    Xiaomi 17 Pro and 17 Pro Max: Specs, Release Date, Price, Features

    September 26, 2025

    Rubio Publishes Vast COVID-19 Report: ‘Beijing Hid The Truth’

    May 17, 2023
    Archives
    Browse By Category
    • Books (1,009)
    • Business (5,914)
    • Events (29)
    • Film (5,850)
    • Lifestyle (3,960)
    • Music (5,951)
    • Politics (5,915)
    • Science (5,265)
    • Technology (5,844)
    • Television (5,528)
    • Uncategorized (6)
    • US News (5,902)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    NASA’s Artemis II mission to the moon is inching toward the launch pad

    January 18, 2026

    Chihiro Amano: ‘It was like I hit a wall in all…

    January 18, 2026

    Where We Left Off & What’s Ahead in Season 15

    January 18, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT