----------------------------------------------------------------------
Message-ID: <20190410164249.GA15611@telecom.csail.mit.edu>
Date: Wed, 10 Apr 2019 16:42:49 +0000
From: Bill Horne <bill@horneQRM.net>
Subject: Verizon issues patch for vulnerabilities on millions of
Fios routers
If you have a Verizon Fios Quantum Gateway router, get the latest
update.
By Alfred Ng
Verizon is sending out an update for millions of its routers after
security researchers discovered vulnerabilities that could allow
attackers to take over the devices.
On Tuesday, researchers from Tenable detailed three vulnerabilities
with Verizon's Fios Quantum Gateway router. The security company said
that it disclosed these security flaws to Verizon in December and that
Verizon issued a fix on March 13.
https://www.cnet.com/news/verizon-issues-patch-for-vulnerabilities-on-millions-of-fios-routers/
--
Bill Horne
(Remove QRM from my email address to write to me directly)
------------------------------
Message-ID: <20190410164554.GA15639@telecom.csail.mit.edu>
Date: Wed, 10 Apr 2019 16:45:54 +0000
From: Bill Horne <bill@horneQRM.net>
Subject: In Verizon 5G launch city, reviewers have trouble even
finding a signal
Reviewers struggle to locate Verizon 5G signals in launch areas of Chicago.
By Jon Brodkin
Verizon launched its mobile 5G network last week in "select areas" of
Minneapolis and Chicago, and a speed test shared by a Verizon
spokesperson showed an impressive download speed of 762Mbps.
But the single speed test displayed by Verizon was conducted near a
tower with clear line of sight to that tower. Actually finding a 5G
signal elsewhere in Verizon's launch areas is much more difficult,
according to tests by The Verge and CNET.
https://arstechnica.com/information-technology/2019/04/in-verizon-5g-launch-city-reviewers-have-trouble-even-finding-a-signal/
--
Bill Horne
(Remove QRM from my email address to write to me directly)
------------------------------
Message-ID: <F40A96F2-F468-44C3-8259-AB3A4DDA352D@roscom.com>
Date: 10 Apr 2019 01:33:40 -0400
From: "Monty Solomon" <monty@roscom.com>
Subject: Well-funded surveillance operation infected both iOS and
Android devices
Malware that stole contacts, audio, location and more was under
development for years.
By Dan Goodin
Researchers recently discovered a well-funded mobile phone
surveillance operation that was capable of surreptitiously stealing a
variety of data from phones running both the iOS and Android operating
systems. Researchers believe the malware is so-called "lawful
intercept" software sold to law-enforcement and governments.
Exodus, as the malware for Android phones has been dubbed, was under
development for at least five years. It was spread in apps disguised
as service applications from Italian mobile operators. Exodus was
hidden inside apps available on phishing websites and nearly 25 apps
available in Google Play. In a report published two weeks ago,
researchers at Security without Borders said Exodus infected phones
estimated to be in the "several hundreds if not a thousand or more."
https://arstechnica.com/information-technology/2019/04/well-funded-surveillance-operation-infected-both-ios-and-android-devices/
------------------------------
*********************************************
End of telecom Digest Thu, 11 Apr 2019