More stories

  • in

    Deal alert: These 10 e-learning bundles teach ethical hacking, cryptocurrency trading, more

    StackCommerce
    When you give your partner the gift of learning, you also provide valuable opportunities. And we have 10 amazing e-learning course bundles that are an extra 15% off during our Valentine’s Day Sale. Just use coupon code VDAY2022 at checkout to score your partner the opportunity to learn a new skill.This bundle has 18 courses, but you can qualify for a well-paid ethical hacking position after completing the first one. And you don’t need any tech experience whatsoever to take it.Get The All-In-One 2022 Super-Sized Ethical Hacking Bundle for $36.54 (reg. $3,284) with code VDAY2022.With this bundle, you can train to become certified to teach English as a foreign language. It also includes lessons on how to develop your coaching and mentoring prowess, among other skills.Get The Complete 2021 TEFL Certification Training Bundle for $33.99 (reg. $250) with code VDAY2022.First, this bundle teaches the fundamentals of blockchain technology and how to use it to drive more revenue. You’ll find training material on how to become a Certified Blockchain Solutions Architect (CBSA) or Certified Blockchain Developer (CBDH).Get The Blockchain Bootcamp Certification Training Bundle for $16.99 (reg. $297) with code VDAY2022.

    This course provides an overview of cryptocurrency and explains how to open accounts. Then it covers the most popular methods of generating passive income from cryptocurrency.Get Cryptocurrency Wealth Creation: Staking, Lending & Trading Course for $16.99 (reg. $200) with code VDAY2022.This bundle thoroughly covers Bitcoin and cryptocurrency trading. But you will also learn about non-fungible tokens (NFTs), including how to create an NFT of your own.Get The Complete NFT & Cryptocurrency Wealth Building Masterclass Bundle for $25.49 (reg. $1,200) with code VDAY2022.The US government created the Risk Management Framework to make cyber supply chain management more secure. This course will teach you the process of qualifying for a range of government cybersecurity positions.Get NIST Cybersecurity & Risk Management Frameworks for $33.15 (reg. $295) with code VDAY2022.The 2022 Ultimate Cybersecurity Analyst Preparation Bundle provides training for a wide variety of cybersecurity certifications. Start with one, and each one afterward will advance your career another step up.Get The 2022 Ultimate Cybersecurity Analyst Preparation Bundle for $25.49 (reg. $1,600) with code VDAY2022.Python is one of the most popular programming languages and easiest to learn. These 12 courses cover an entire career of Python training, but you can start applying for positions after completing just one. Python skills are excellent for remote work, so you may also want to learn a new language or two if you end up working abroad.Get The 2022 Premium Python Programming PCEP Certification Prep Bundle for $29.74 (reg. $2,400) with code VDAY2022.This is the ultimate e-learning bundle. You get more than 1,000 courses covering a wide variety of industries with StackSkills, another 800 tech courses from Stone River, and over 90 specialized courses on cybersecurity from Infosec4TC, which has an impressive rating of 4.8 out of 5 stars on Trustpilot.Get The Ultimate Lifetime Bundle of StackSkills + Infosec4TC + Stone River for $97.75 (reg. $13,994) with code VDAY2022.Cybersecurity is more crucial than ever, and these six courses will help you prepare for the IT certifications needed to pursue a career in this field. Each course focuses on CompTIA certifications, ensuring you’ll develop a vendor-neutral understanding of IT and security.Get The 2022 Premium CompTIA CyberSecurity & Security+ Exam Prep Bundle for $25.50 (reg. $1,200) with code VDAY2022.

    More ZDNet Academy Deals More

  • in

    Europe's biggest car dealer hit with ransomware attack

    One of Europe’s biggest car dealers, Emil Frey, was hit with a ransomware attack last month, according to a statement from the company. 

    ZDNet Recommends

    The Swiss company showed up on the list of victims for the Hive ransomware on February 1 and confirmed that they were attacked in January. “We have restored and restarted our commercial activity already days after the incident on January 11, 2022,” a spokesperson said, declining to answer more questions about whether customer information was accessed. The company — which has about 3,000 employees — generated $3.29 billion in sales in 2020 thanks to a variety of automobile-related businesses. It was ranked as the number 1 car dealership in Europe based on revenue and the total number of vehicles for sale. The FBI spotlighted the Hive ransomware group in August 2021 after their members attacked dozens of healthcare organizations last year. In 2021, Hive attacked at least 28 healthcare organizations, including Memorial Health System, which was hit with a ransomware attack on August 15. The FBI alert explains how the ransomware corrupts systems and backups before directing victims to a link to the group’s “sales department” that can be accessed through a TOR browser. The link brings victims to a live chat with the people behind the attack, but the FBI noted that some victims have even been called by the attackers demanding ransoms. 

    Most victims face a payment deadline ranging between two and six days, but others were able to extend their deadlines through negotiation. On Wednesday, the FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC), and the Australian Cyber Security Centre (ACSC) released a warning indicating that a growing wave of increasingly sophisticated ransomware attacks poses a threat to critical infrastructure and organizations around the world.”We live at a time when every government, every business, every person must focus on the threat of ransomware and take action to mitigate the risk of becoming a victim,” said CISA Director Jen Easterly.  More

  • in

    How cell tower 'COW' drones will keep fans safe at the Super Bowl

    FirstNet flying COW
    FirstNet
    For fans in Los Angeles, host to this year’s Big Game, the Super Bowl is a chance to tailgate and celebrate. For first responders in the LA region, it’s a massive public safety event that’s a year in the making.One of the big concerns is network strain. AT&T is answering the call for help with a number of technologies, including the “flying COW,” essentially drones that double as cell towers.Also: How to watch the Super Bowl: All of your streaming optionsThe problem is acute. LA’s SoFi stadium has 10X the capacity versus the Super Bowl’s venue in 2020, and there’s a long legacy of network disruptions during large events. That can lead to significant safety concerns. One striking example is the 2013 Boston Marathon bombing. So many bystanders were using their cell phones that the high call volume saturated the local cellular networks, causing signal delays and failed calls that rendered mobile phones nearly useless. For area first responders on duty that day, the consequences of poor network coverage and capacity was dire — the lack of a reliable network delayed the ability to share the images and videos that ultimately helped to identify the alleged perpetrators.

    [embedded content]

    AT&T has been busy mobilizing around SoFi Stadium. Thanks to the provider’s public-private-partnership with the First Responder Network Authority (FirstNet Authority) — an independent agency within the federal government — AT&T is also delivering 5G to first responders in Los Angeles. FirstNet has been committed to revamping public safety for massive events and also during disaster recovery. The three Flying COWs (which stands for “cellular on wings”) in the FirstNet fleet comprise two tethered drones and a trailer for transport that is equipped with a satellite dish and fiber connections. Southern California is a fair weather place, but the drones are capable of withstanding light rain and wind speeds up to 25 miles per hour — while reaching heights of up to 400 feet. Outfitted with Band 14, AT&T can use the COWs to help equip FirstNet subscribers in the US with connectivity during high-usage events. 

    For the Super Bowl, FirstNet will also deploy a Communications Vehicle, a therapy dog to help with first responders’ mental health during stressful situations, one FirstNet Micro SatCOLT (Satellite Cell on Light Truck), six ground COWs (Cell on Wheels) with Band 14 spectrum antennas for FirstNet, and thousands of feet of fiber in and around the stadium.AT&T has been moving aggressively in Los Angeles. From 2018 to 2020, it expanded coverage and improved connectivity by investing nearly $2.7 billion in wireless and wireline networks in the greater Los Angeles area. More

  • in

    Microsoft, Oracle, Apache and Apple vulnerabilities added to CISA catalog

    The US Cybersecurity and Infrastructure Security Agency (CISA) updated its catalog of known exploited vulnerabilities this week, adding 15 vulnerabilities based on evidence that threat actors are actively exploiting them.The list includes a Microsoft Windows SAM local privilege escalation vulnerability with a remediation date set for February 24. Vulcan Cyber engineer Mike Parkin said the vulnerability — CVE-2021-36934 — was patched in August 2021 shortly after it was disclosed. “It is a local vulnerability, which reduces the risk of attack and gives more time to deploy the patch. CISA set the due date for Federal organizations who take direction from them, and that date is based on their own risk criteria,” Parkin said. “With Microsoft releasing the fix 5 months ago, and given the relative threat, it is reasonable for them to set late February as the deadline.”The rest of the list covers a range of Microsoft, Apache, Apple, and Jenkins vulnerabilities with remediation dates of August 10.While some experts questioned CISA’s new additions to the list, Netenrich’s John Bambenek explained that anything that provides a straightforward path to elevated privileges and is being exploited by the kind of threat actors CISA is concerned about needs to be remediated immediately.  
    CISA
    Pravin Madhani, CEO of K2 Cyber Security, noted that more than half of the vulnerabilities are classified as remote code execution (RCE) vulnerabilities.  

    “RCE is one of the most dangerous types of vulnerabilities as it gives the attacker the ability to run almost any code on the hacked site. RCE, and other flaws such as XSS (Cross Site Scripting), have long been included on the OWASP Top 10 list, so why aren’t companies better equipped to protect against these attacks?” Madhani asked. Viakoo CEO Bud Broomhead said he believes cybercriminals are using older vulnerabilities in exploits against new device targets, specifically IoT devices. As an example, Broomhead mentioned vulnerabilities that enable man-in-the-middle (MitM) attacks. “Virtually all IT systems are protected against this threat, but IoT systems often are not, leading threat actors to revisit these older vulnerabilities knowing that network-connected IoT devices can be exploited through them,” Broomhead said. “This would lead to a vulnerability discovered years ago being added recently to the CISA catalogue. With close to 170,000 known vulnerabilities priority should be given to the ones that are causing real damage right now, not ones that in theory could cause damage.” More

  • in

    Google says nearly $9 million given out in 2021 vulnerability rewards

    Google announced this week that its Vulnerability Reward Programs doled out $8,700,000 for vulnerability rewards in 2021. Researchers donated $300,000 of their rewards to a charity of their choice, according to a blog from Sarah Jacobus of Google’s Vulnerability Rewards Team.For Android vulnerabilities, payouts doubled compared to 2020, with almost $3 million being rewarded to researchers for a variety of bugs. The company also handed out its largest Android payout ever at $157,000. The company also launched the Android Chipset Security Reward Program, an invite-only program for researchers looking through manufacturers of certain popular Android chipsets. The program paid $296,000 for over 220 unique security reports, specifically shouting out Aman Pandey of the Bugsmirror Team, Yu-Cheng Lin, and researcher gzobqq@gmail.com, who secured the $157,000 award. The company noted that it is also offering $1,500,000 for bugs found in the Titan-M Security chip used in their Pixel device. 
    Google
    When it comes to Chrome, the company set a new record as well. Google gave out $3.3 million in VRP rewards to 115 researchers that found 333 unique Chrome security bugs. “Of the $3.3 million, $3.1 million was awarded for Chrome Browser security bugs and $250,500 for Chrome OS bugs, including a $45,000 top reward amount for an individual Chrome OS security bug report and $27,000 for an individual Chrome Browser security bug report,” Jacobus said. 

    “Of these totals, $58,000 was awarded for security issues discovered by fuzzers contributed by VRP researchers to the Chrome Fuzzing program. Each valid report from an externally provided fuzzer received a $1,000 patch bonus, with one fuzzer report receiving a $16,000 reward.”Jacobus also spotlighted Rory McNamara, Leecraso, and Brendon Tiszka for their work on Chrome bugs. Google Play paid out $550,000 in rewards to more than 60 security researchers. The tech giant was also eager for exploit research on their kCTF cluster, raising their reward amounts in November from up to $10,000 to up to $50,337. Several participants brought in $175,685 in rewards. The Google Cloud Platform awarded Ezequiel Pereira the top prize for finding an RCE in Google Cloud Deployment Manager, awarding him $133,337. In total, the Google Cloud Platform paid winners of the 2020 competition $313,337. Google said they partnered with researchers to find and fix thousands of vulnerabilities throughout 2021 and launched bughunters.google.com to help move the effort along. The platform gives researchers a place to submit bugs for Google, Android, Chrome, Google Play, and more. The platform gamifies the bug hunting process by offering per-country leaderboards, company swag, awards, and more. The company also explained that the Vulnerability Research Grant program awarded $200,000 in grants to more than 120 security researchers around the world. “With the launch of the new Bug Hunters portal, we plan to continue improving our platform and listening to you – our researchers – on ways we can improve our platform and Bug Hunter University,” Jacobus said. “Thank you again for making Google, the Internet, and our users safe and secure!” More

  • in

    Google: Vendors took an average of 52 days to fix reported security vulnerabilities

    Google’s Project Zero released a report covering its work in 2021. It found that vendors took an average of 52 days to fix reported security vulnerabilities.Between 2019 and 2021, Project Zero researchers reported 376 issues to vendors under their 90-day deadline. Of those 376 issues, more than 93% of these bugs have been fixed and over 3% have been marked as “WontFix” by the vendors, according to Project Zero. The researchers added that 11 other bugs remain unfixed and 8 have passed their deadline to be fixed. Microsoft, Apple, and Google account for 65% of the bugs discovered. Microsoft led the way with 96 bugs, followed by 85 from Apple and 60 from Google.”Overall, the data show that almost all of the big vendors here are coming in under 90 days, on average. The bulk of fixes during a grace period comes from Apple and Microsoft (22 out of 34 total). Vendors have exceeded the deadline and grace period about 5% of the time over this period,” Project Zero researchers said. “In this slice, Oracle has exceeded at the highest rate, but admittedly with a relatively small sample size of only about 7 bugs. The next-highest rate is Microsoft, having exceeded 4 of their 80 deadlines. [The] average number of days to fix bugs across all vendors is 61 days.”
    Google
    Google also provided other statistics showing that the overall time to fix has consistently been decreasing, particularly for vendors like Microsoft, Apple, and Linux. All three reduced their time to fix between 2019 and 2020 while Google sped up in 2020 and slowed down again in 2021. 

    In 2021, they noted that only one 90-day deadline was exceeded, a stark decrease compared to the average of 9 per year in the other two years. The researchers added that the grace period was used 9 times — with half being by Microsoft — versus the slightly lower average of 12.5 in the other years.When it comes to mobile vulnerabilities, iOS devices had 76 total bugs, followed by 10 for Samsung Android devices and 6 for Pixel Androids. For browsers, Chrome had 40 bugs and an average time to patch of 5.3 days. WebKit had 27 bugs and an 11.6-day average time to patch while Firefox had 8 bugs and a 16.6-day average time to fix.”Chrome is currently the fastest of the three browsers, with time from bug report to releasing a fix in the stable channel in 30 days. Firefox comes in second in this analysis, though with a relatively small number of data points to analyze. Firefox releases a fix on average in 38 days,” the researchers said.”WebKit is the outlier in this analysis, with the longest number of days to release a patch at 73 days. Their time to land the fix publicly is in the middle between Chrome and Firefox, but unfortunately, this leaves a very long amount of time for opportunistic attackers to find the patch and exploit it prior to the fix being made available to users.”Project Zero said the findings were a positive development, showing that many vendors are fixing most of the bugs they find. Vendors are also moving faster to rectify issues, with Google attributing it to responsible disclosure policies that have become the standard in the industry.Google urged all vendors to focus on a “more frequent patch cadence for security issues.””We encourage all vendors to consider publishing aggregate data on their time-to-fix and time-to-patch for externally reported vulnerabilities. Through more transparency, information sharing, and collaboration across the industry, we believe we can learn from each other’s best practices, better understand existing difficulties and hopefully make the internet a safer place for all,” Project Zero said. More

  • in

    Amazon steps in to close exposed FlexBooker bucket after December data breach

    Digital scheduling platform FlexBooker has been accused of exposing the sensitive data of millions of customers, according to security researchers at vpnMentor.The researchers said the Ohio-based tech company was using an AWS S3 bucket to store data but did not implement any security measures, leaving the contents totally exposed and easily accessible to anyone with a web browser. The 19 million exposed files included full names, email addresses, phone numbers and appointment details. FlexBooker did not respond to requests for comment from ZDNet but vpnMentor said they contacted the company and Amazon about the issue.”We did contact them in January, to which they sent what seemed to be an automatic reply about the leak that affected them in December. We tried to explain it was a new breach, but didn’t hear back,” a vpnMentor spokesperson said. “Which is why we decided to contact AWS directly (as Flexbooker wrote on their site they were working together with Amazon), and soon after the bucket was secured (Amazon probably informed Flexbooker, as Amazon isn’t supposed to do it themselves).”In January, FlexBooker apologized for a data breach that involved the sensitive information of 3.7 million users. At the time, the company told ZDNet a portion of its customer database had been breached after its AWS servers were compromised on December 23. FlexBooker said their “system data storage was also accessed and downloaded” as part of the attack. They added they worked with Amazon to restore a backup and they were able to bring operations back in about 12 hours. 

    “We sent a notification to all affected parties and have worked with Amazon Web Services, our hosting provider, to ensure that our accounts are re-secured,” a spokesperson said. “We deeply apologize for the inconvenience caused by this issue.”Researchers at vpnMentor said they were not aware of this data breach as they scanned the internet for potential vulnerabilities in December. By January 23, vpnMentor confirmed the latest issue and contacted FlexBooker on January 25. Amazon was contacted the same day and by January 26, Amazon had resolved the issue. “Flexbooker’s misconfigured AWS account contained over 19 million HTML files which exposed what seemed to be automated emails sent via FlexBooker’s platform to users. This means potentially up to 19 million people were exposed, depending on how many people made multiple bookings on a website using Flexbooker,” the researchers said in the report. “Each email appeared to be a confirmation message for bookings made via the platform, and exposed both the FlexBooker account holder and the person(s) who made a booking. For example, a plumbing supply company was using FlexBooker to schedule consultations between employees and customers. In this instance, PII data for both people were exposed.”One of the appointments exposed by FlexBookers platform. 
    vpnMentor
    The leaks are alarming because they included links with unique codes that could be used to create cancellation links, edit links, and view the appointment details that were hidden in the emails.The S3 bucket was also live when vpnMentor discovered it, meaning it was constantly being updated with new information, exposing more and more people every day. vpnMentor included screenshots of the appointments, which ranged from COVID-19 tests to pet euthanizations and babysitting appointments. The babysitting emails exposed the sensitive information of children as well. “A few days after the breach was secured, we observed hackers on the dark web once again selling private data apparently owned by Flexbooker. It’s not clear if this was from the previous breach, the one our team discovered, or a mix of both. However, it shows the risk for companies who don’t adequately secure their users’ data and how quickly hackers can get stolen data out into the open,” the researchers explained. In January, Australian security expert Troy Hunt, who runs the Have I Been Pwned site that tracks breached information, said the first trove of stolen data included password hashes and partial credit card information for some accounts. Hunt added that the data “was found being actively traded on a popular hacking forum.”A FlexBooker spokesperson confirmed Hunt’s report, telling ZDNet that the last 3 digits of card numbers were included in the breach but not the full card information, expiration date, or CVV.  More

  • in

    Netgear Nighthawk M5 5G WiFi 6 Mobile Router review: Versatile portable connectivity

    The Nighthawk M5 measures 105mm (4.14in.) square and is 21.5mm (0.85in.) thick. It has a 2.4-inch LCD touch screen, a power button, a USB-C port and an RJ-45 Ethernet port. There are also two TS-9 connectors for use with external 5G/4G/3G antennas.
    Images: Netgear
    MiFi-style wireless routers have fallen out of fashion, thanks to smartphones with good data plans and coffee shops with free Wi-Fi. But there’s still a place for portable cellular connectivity, especially in a world of hybrid work where the option of being online anywhere has great value. Netgear’s Nighthawk M5 5G WiFi 6 Mobile Router is an attempt to update the MiFi form factor for modern demands.  The Netgear Nighthawk M5 (MR5200) costs £779.99 (inc. VAT; £649.99 ex. VAT) in the UK, or $699.99 in the US.  A simple black box with an LCD touch screen on the top, the Nighthawk M5 has two ports: RJ-45 Ethernet and a dual-purpose USB-C connector for tethering laptops and powering the router. Inside there’s a slot for a 5040mAh battery and a Micro-SIM card. The bottom pops off easily, allowing you to remove the battery and swap out SIMs as needed. The Nighthawk M5 also has two TS-9 antenna connectors for working with external MIMO antenna to increase range.  Under the hood is Qualcomm’s Snapdragon X55 chipset. This is a standalone set of 5G hardware, with both modem and RF components. It’s one of the better 5G customer premises chipsets, supporting MIMO antennae and capable of using all the bandwidth in a 5G signal for impressive download speeds. Wi-Fi performance is good, with Wi-Fi 6 (dual-band 2.4/5GHz 802.11ax) support for up to 1.8Gbps. We were able to get speeds of over 200Mbps in a busy London suburb in a home with relatively poor indoor 5G performance. 

    LikeEasy to set up and useHigh-performance portable 5G modem/router

    Don’t LikeExpensiveToo many administration tools

    Going online Getting started is simple enough. Put in a SIM, make sure the battery is charged and turn on the router. You’ll be prompted to set up a network SSID and password, as well as adding an admin password for the device’s web-based admin tool. Usefully all this is handled on the device, using the touch screen and an on-display keyboard. We did find you needed to make a relatively firm press on the keys, so take your time if you don’t want to have to reset the device after an inadvertent typo!  The router will then connect to your cellular provider, displaying the signal strength and how much data has been used. The display serves as a reminder of your wireless network, showing the number of connected devices and giving access to quick on-device settings.  While the on-device quick start is enough to get you started, not everything can be managed from the device’s screen — it’s for relatively simple tasks like setting SSID and passwords, as well as managing tethering. More complex tasks, like managing the build DHCP server and changing device IP ranges, need the web-based admin tool or the Netgear Mobile app, which is available for both Android and iOS. 

    This is perhaps the Nighthawk M5’s biggest drawback: it’s hard to remember which admin tool you need to complete which task. It’s fair enough to have a limited UI on a small LCD screen, but when your mobile admin app forces you to use the web for complex tasks it’s clear that there are too many tools.  Netgear Nighthawk M5 (MR5200) specifications    5G NR bands n1, n3, n5, n7, n8, n20, n28, n38, n40, n77 and n78  4G LTE bands 700/800/900/1800/2100/2600MHz (FDD), 2300/2600MHz (TDD)    3G bands 850/900/1900/2100MHz   Chipset Qualcomm Snapdragon X55 5G modem   Wi-Fi   Wi-Fi 6 (802.11ax); AX1800 max throughput (1.2Gbps on 5GHz, 600Mbps on 2.4GHz)   Number of devices supported over Wi-Fi Up to 32   Dimensions 105mm x 105mm x 21.5mm (4.14in. x 4.14in. x 0.85in.)   Weight 240g (0.54lbs) with battery   Display 2.4-inch LCD touch screen   Battery 5040mAh   Battery life Up to 13 hours on a single charge   Smartphone app   Netgear Mobile (Android, iOS)   Price$699.99, £779.99 (inc. VAT; £649.99 ex. VAT) Save battery life One of the Nighthawk M5’s more interesting features is its support for battery-free operation. Keeping a battery on charge can significantly reduce its life, so if you’re using the M5 as a 5G wireless broadband access point for a wired network, you can simply pop out the battery and restart. The router will run off its USB-C power supply while it provides Wi-Fi and wired connectivity.  While the device will warn you that the battery isn’t installed, the warning is quickly dismissed. Removing the battery when you’re working in one place for a long time and have access to power makes sense, especially when you’re considerably reducing the risk of catastrophic battery failure.  With the battery removed, the Nighthawk M5 behaves much like any other Wi-Fi access point, with some additional features that make it a useful option for small offices and for edge computing. While you can use it to quickly provide Wi-Fi anywhere there’s a 4G or 5G signal, there’s also the interesting option of using it in what Netgear calls ‘Always-on Wi-Fi’ mode. Here you’re using the device as a standard Ethernet-connected wireless router. However, if it detects loss of internet connectivity, it’ll automatically switch to its 5G modem.  Not only a portable router Other options include support for data offloading, where the router works with an external Ethernet or Wi-Fi connection to reduce load on your cellular data connection. This approach has the added advantage of letting you use the Nighthawk M5 as a travel router, sharing one Wi-Fi connection between multiple devices. Just make sure you’re using a separate IP address range from the host Wi-Fi network.  A 5G Wi-Fi network to go, or 5G failover for your home/office network.
    Image: Netgear
    I’ve been using the Nighthawk M5 for failover connectivity in a small/home office network, connecting it to the Ethernet WAN port on a Draytek broadband router. It’s installed near the router, close to the main windows. While performance is good, it is limited by being indoors. There’s the option of using an external MIMO 5G antenna, connected to its TS-9 ports, which can be mounted outside the house.  It’s important to note that this isn’t a budget device. Like much of the Nighthawk family, the M5 carries a premium price. However, you do get premium performance to go with it. Paired with an unlimited data plan it’s a good alternative to fixed-line broadband, with the added option of being portable. Slip it in a pocket or travel bag and your laptop will have excellent connectivity — as long as you’re in a 5G area.  RECENT AND RELATED CONTENT  5G arrives: Understanding what it means for you Smart home: Six tech upgrades to make your house even smarter The best 5G home internet: Your broadband options Best hotspot: Work securely anywhere Read more reviews More