Huawei can 'covertly access' mobile phone networks worldwide via secret 'back doors', claim US officials

clock • 2 min read

Huawei denies claims that secret 'back doors have been built-in to Huawei mobile hardware for more than a decade

Huawei mobile networking hardware contains back doors, supposedly for use by law enforcement, which also enables surreptitious access to networks worldwide by Chinese authorities. Furthermore, s...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
UK and India announce joint Technology Security Initiative

Government

Countries say the new initiative to drive economic growth, create jobs and strengthen the bilateral relationship

clock 26 July 2024 • 3 min read
Peter Cochrane: Energy and resources are no longer free

Green

We need new thinking

clock 09 July 2024 • 3 min read
Asian Tech Roundup: Pressure grows in US-China trade war

Security

Plus: Google 'accidentally' deletes pension fund's cloud account

clock 17 May 2024 • 4 min read
Most read
03

Halliburton apparently hit by major cyberattack

22 August 2024 • 2 min read
04
05

A call for concrete AI legislation in the UK

20 August 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read