More stories

  • in

    Dish partners with FreedomFi to deliver 5G hotspots

    Anyone can set up a Wi-Fi network. Setting up a 4G LTE or 5G network, that’s a different story. It took expensive, proprietary hardware from incumbent network equipment manufacturers. Now, thanks to a partnership of Dish Network, Helium Network, and FreedomFi it’s become affordable to set up your own small-scale cellular network. Here’s how it works.Dish Wireless provides the cellular data backbone. If you’re thinking, “but isn’t Dish a satellite TV company?” You’re right, it is. But, it also owns Boost Mobile, Ting, and Republic Wireless. While Dish is working on its own cellular network, in the meantime it’s moving to AT&T for its 4G and 5G networks for its cellular customers.

    Helium provides the next link in the bridge. It’s a consumer-deployed, decentralized wireless infrastructure that produces and delivers data-forwarding hotspots. By installing a hotspot in the home or office, you can provide and/or strengthen your 5G wireless coverage using the Citizens Broadband Radio Service (CBRS) 3Ghz spectrum. Despite its name, CBRS has nothing to do with the Citizen Band (CB) radio you might recall from the 60s and 70s and movies such as Smokie and the Bandit.  In addition, Helium users also earn rewards as $HNT, a Helium network-based token. This is a blockchain-based cryptocurrency. Helium appears to be doing well with this novel way of expanding 5G networks. It currently has over 240,000 low-power wide-area networks, and LoRA-based hotspots across 21,000 cities in North America, Europe, and Asia. Over 500,000 additional hotspots are currently back-ordered and over 50 new manufacturers are waiting to be approved to build and sell Helium-compatible hardware.Helium connects the Dish network to the FreedomFi devices by using WHIP. This is an open-source and standards-compliant wireless network protocol built for low-power devices over large areas. Helium Decentralized Wire Network (DWN) provides wireless access to the internet for devices using multiple independent access points, which are also miners. Dish pays miners for transmitting data to and from the internet with HNTs.Dish has been working with blockchain-based coinage for some time. In 2014, it was the first large company to accept Bitcoin, and the first subscription-based TV provider to accept the currency. The company added Bitcoin Cash as a payment option in 2018, and the following year, GoChain added Dish as a signing node on its public network. Additionally, Dish and Input Output Global, the company behind the Cardano blockchain, announced a partnership agreement to build blockchain-based services together. In short, Dish is comfortable with cryptocurrency.

    “Using Helium Network’s technology and blockchain-based incentive model, Dish is a pioneer in supporting an entirely new way to connect people and things,” said Amir Haleem, Helium’s CEO and co-founder. “The CBRS-based 5G hotspots will be deployed by customers, creating opportunities for users, partners, and the entire ecosystem.”Those hotspots are FreedomFi Gateways. These are commodity, x86 network appliances that offers a straightforward, highly affordable path for anyone to build their own Private LTE or 5G network using open-source software and small cell radios. Put it all together and you get an inexpensive way to bring 5G to your business and customers and possibly make some virtual money along the way.Related Stories: More

  • in

    Juniper Networks meets Wall Street expectations in Q3, brings in net revenue of $1.18 billion

    Networking equipment company Juniper Networks delivered better-than-expected third quarter financial results, reporting non-GAAP net income of $152 million, an increase of 5% year-over-year. The non-GAAP diluted earnings per share are $0.46 and net revenue is $1.188 billion, nearly matching Wall Street’s expectations of $1.2 billion and $0.46 per share earnings. See also: Juniper Networks beats Wall Street expectations for Q2, predicts higher supply costs for Q3Juniper Networks shares are up 1.71% at $27.02 in after-hours trading.”We reported a fifth consecutive quarter of year-over-year revenue growth and a second consecutive quarter of exceptional order growth during the Q3 time period,” said Juniper’s CEO Rami Rahim on Tuesday. Juniper Networks expects to deliver a revenue around $1.26 billion, plus or minus $50 million, in Q4. The non-GAAP net income per share will be approximately $0.53, plus or minus $0.05. In April, CFO Ken Miller said the company was “experiencing ongoing supply constraints which have resulted in extended lead times,” blaming the slowdown on the “worldwide shortage of semiconductors impacting many industries.”

    The company included a similar message in July, reminding investors that there is still a worldwide shortage of semiconductors, caused in part by the COVID-19 pandemic. They reiterated that there will be extended lead times and elevated costs that will “persist for at least the next few quarters.”Today, Miller said that the company “executed extremely well despite the challenging supply chain environment and demonstrated strong financial management during the September quarter.” “Our strong order momentum, record backlog, and actions to strengthen our supply chain provide confidence in our future growth prospects and our ability to deliver improved profitability in 2022 and beyond,” Miller added.Juniper Networks bought Apstra for an undisclosed sum in January and spent $450 million acquiring 128 Technology Inc. in October 2020.

    Tech Earnings More

  • in

    F5 beats Wall Street expectations for Q4, capping strong 2021

    Application security company F5 Networks delivered better-than-expected fourth-quarter financial results, reporting non-GAAP net income of $185 million, or $3.01 per diluted share, on revenue of non-GAAP $617 million.The fourth-quarter fiscal year 2021 GAAP revenue was $682 million, beating Wall Street’s expectations of $671.51 million and $2.75 per share earnings.See also: F5 to acquire multi-cloud security software maker Volterra for $500 million, raises financial outlook. This year, the company announced that it would acquire distributed multi-cloud application security and load-balancing software company Volterra of Santa Clara, California. F5 Networks also announced last month that it is acquiring cloud security company Threat Stack for $68 million.F5 shares are up 2% at $208.12 in after-hours trading.For fiscal year 2021, F5 delivered GAAP revenue of $2.60 billion, up 11% year over year. The company said its revenue growth was driven by 21% product revenue growth and 2% global services revenue growth compared to last year. F5 expects to deliver revenue in the range of $665 million to $685 million, with non-GAAP earnings in the range of $2.71 to $2.83 per diluted share for Q1. 

    François Locoh-Donou, F5’s president and CEO, said the strong Q4 caps a “year of robust financial performance for F5.””With software revenue representing 45% of product revenue in the fourth quarter, and 80% of this software revenue coming from subscriptions, we continue to mark milestone after milestone in our rapid transformation to a software led business model,” Locoh-Donou said.”Skyrocketing application usage and heightened security awareness are driving strong demand for F5 solutions on premises, in the cloud, and across multiple clouds. Our expanded solutions portfolio and vision for enabling Adaptive Applications puts us at the intersection of these strong and sustainable secular trends and positions F5 for continued strong revenue and earnings growth.”

    Tech Earnings More

  • in

    DOJ, Europol arrest hundreds as part of international darknet drug operation

    DOJ
    The Justice Department, Europol and dozens of police forces worldwide announced hundreds of arrests and the seizure of $31 million as part of operation Dark HunTOR — an effort to disrupt dark web marketplaces selling guns, drugs and more. Police forces in the US, Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland and the UK arrested 150 people while seizing 45 firearms and 234kg of drugs — including 152.1kg of amphetamine, 21.6kg of cocaine, 26.9kg of opioids and 32.5kg of MDMA.More than 200,000 ecstasy, fentanyl, oxycodone, hydrocodone and methamphetamine pills were seized alongside counterfeit medicine. Europol said a number of the suspects arrested are considered “high-value targets.”US officials arrested 65 people — the most of any country involved — and Germany nabbed 47 others. 24 people were arrested in the UK, and others were picked up across Europe. All of the law enforcement agencies involved noted that investigations are still being conducted as they try to identify the people behind certain dark web accounts. The Justice Department said arrests were made of those involved in active dark web marketplaces as well as inactive ones, including Dream, WallStreet, Dark Market and White House, which shut down this month.Italian police also disrupted the DeepSea and Berlusconi dark web marketplaces, seizing nearly $4.2 million in cryptocurrency. “The point of operations such as the one today is to put criminals operating on the dark web on notice: the law enforcement community has the means and global partnerships to unmask them and hold them accountable for their illegal activities, even in areas of the dark web,” Europol deputy executive director of operations Jean-Philippe Lecouffe said. 

    In a press conference Tuesday morning, US Deputy Attorney General Monaco said the 10-month international law enforcement operation spanned across three continents and involved dozens of US and international law enforcement agencies “to send one clear message to those hiding on the darknet peddling illegal drugs: there is no dark internet.” “We can, and we will shine a light,” Monaco said. “Operation Dark HunTor prevented countless lives from being lost to this dangerous trade in illicit and counterfeit drugs because one pill can kill. The Department of Justice, with our international partners, will continue to crack down on lethal counterfeit opioids purchased on the DarkNet.”Law enforcement officials said the operation was a follow-up to the January takedown of DarkMarket, another widely used illegal marketplace that was disrupted earlier this year. Police in Germany arrested the leading operator and others connected to DarkMarket. That operation allowed authorities to seize DarkMarket’s infrastructure, providing law enforcement agencies worldwide with a trove of evidence to search through. US officials focused their announcement on the disruption of opioid and fentanyl trafficking due to the drug’s prominence in the US and a spate of recent high-profile deaths connected to drugs tainted with the deadly fentanyl.”Today, we face new and increasingly dangerous threats as drug traffickers expand into the digital world and use the Darknet to sell dangerous drugs like fentanyl and methamphetamine,” DEA administrator Anne Milgram said. “These drug traffickers are flooding the United States with deadly, fake pills, driving the US overdose crisis, spurring violence, and threatening the safety and health of American communities. DEA’s message today is clear: criminal drug networks operating on the Darknet, trying to hide from law enforcement, can no longer hide.”US Postal Inspection Service chief postal inspector Gary Barksdale noted that criminals are increasingly turning to the dark web to sell and ship narcotics and other dangerous goods around the world, “often relying on the postal system and private carriers to deliver these illegal products.”Investigators said they discovered that one of the unnamed organizations at the center of the operation was based in Houston, Texas and was involved in selling methamphetamine, counterfeit pressed Adderall, MDMA, cocaine and ketamine across the US. One of the DarkNet vendor accounts was run by people living in Fort Lauderdale, and another was based in Providence, Rhode Island. Agents who conducted the arrests discovered 3.5 kilograms of pressed fentanyl.Others arrested were marketing and selling counterfeit Adderall through the mail that was simply methamphetamine.  More

  • in

    Verizon opens up its 5G Nationwide network to certified IoT devices

    Verizon-certified IOT devices can now access Verizon’s 5G Nationwide network, the company announced Tuesday. The network is accessible via compatible data plans in Verizon’s ThingSpace IoT Marketplace. 

    ZDNet Recommends

    Best 5G phone 2021

    5G is now standard on US networks, with the expectation that every flagship includes support for 5G.

    Read More

    Verizon’s “5G Nationwide” network leverages Dynamic Spectrum Sharing (DSS) technology on a low-band spectrum, which lets customers jump to 4G LTE or 4G in areas where 5G service isn’t available. By bringing IoT devices onto the network, Verizon Business is aiming to be a “single-provider destination for IoT, with solutions spanning broadband and narrowband, 5G and LTE… for applications across industries,”  TJ Fox, SVP of Industrial IoT and Automotive for Verizon Business, said in a statement. The company on Tuesday also announced new analytics and IoT management tools for Verizon customers, as well as a Verizon-certified, low-cost device that should make IoT more accessible to more users and more use cases. Verizon said more 5G Nationwide-compatible hardware and plans will be available later this year. Next year, Verizon plans to open up its 5G Ultra Wideband network to compatible IoT devices and plans. While “5G Nationwide” leverages 5G and 4G, the “Ultra-Wideband” network uses a high-band, ultra-wide millimeter wave spectrum to deliver high-speed 5G. At its Investor Day presentation back in March, Verizon said it plans to build another 14,000 millimeter wave sites this year, offering what Verizon CFO Matthew Ellis called “the ultimate experience of 5G.” The company is also making significant investments to expand C-Band 5G, which will bolster its network-as-a-service strategy. Verizon’s larger 5G strategy involves melding 5G with edge computing and IoT, as well as creating an ecosystem with tech giants such as AWS and Microsoft Azure.The new analytics tools will be part of the Verizon ThingSpace Intelligence suite, which includes a bundle of existing IoT services, such as Intelligence Analytics Dashboard, SIM Secure, Device Diagnostics and Location Services. Its new capabilities include Wireless Network Performance, Anomaly Detection, Network-coordinated firmware-over-the-air (FOTA) management, and the ThingSpace Analytics engine. The suite is available for customer trials now and should be commercially available next year. As for the new low-cost IOT module, it comes from Quectel with a Qualcomm chipset. At less than $4, Verizon said it should make it easier than ever to deploy industrial sensors. Its low power consumption makes it suitable for applications that expect to operate for 15 or 20 years without being touched, such as smart meters, HVAC units, air and water quality monitors, manufacturing controls, smart lighting nodes and municipal smart infrastructure.

    The BC660K-GL module is certified with Verizon, making the carrier the first in the US to enable the module on its nationwide narrowband IoT network. Connectivity plans from Verizon will start at less than $1. More

  • in

    Verizon, Amazon's Project Kuiper team up on rural broadband, business connectivity

    Innovation

    Verizon and Amazon’s Project Kuiper are teaming up to combine Amazon’s low Earth orbit satellite network with the wireless carrier’s network. While bringing connectivity to rural areas is a win the enterprise potential is what’ll make the partnership run.At a high level, the Verizon and Amazon partnership rhymes with Elon Musk’s Starlink service and satellite broadband network. Amazon’s Project Kuiper will deliver cellular backhaul service to extend Verizon’s 4G and 5G reach. The two companies will also develop technical specifications and define commercial models for a bevy of connectivity services in the US for consumers and global enterprises. The latter customer base is what’ll carry the day. Keep in mind that Amazon and Verizon have strong partnerships and mutual customers. Verizon and AWS outlined a partnership at re:Invent 2019 and has expanded it since. The two companies are already launching edge computing services that combine Verizon’s local reach and cellular network with Amazon Web Services.According to the companies, Verizon and Project Kuiper will examine low Earth orbit (LEO) satellite use cases for agriculture, energy, manufacturing, education, transportation and emergency response. In other words, the LEO partnership can connect a lot of smart farms, plants and edge compute in addition to rural consumers with a 3,236-satellite network. Here’s a look at some of the goals for the LEO collaboration:Expand Verizon’s data networks using cellular backhaul from Project Kuiper. Define technical requirements to extend fixed wireless coverage to rural and remote areas. Leverage antenna development from Project Kuiper.Create wireless, private and edge networks for enterprises working in remote industries.A bit of recent history in the satellite broadband race:

    Networking More

  • in

    CISA warns of remote code execution vulnerability with Discourse

    Open Source

    CISA urged developers to update Discourse versions 2.7.8 and earlier in a notice sent out on Sunday, warning that a remote code execution vulnerability was tagged as “critical.” The issue was patched on Friday, and developers explained that CVE-2021-41163 involved “a validation bug in the upstream aws-sdk-sns gem” that could “lead to RCE in Discourse via a maliciously crafted request.”Developers noted that to work around the issue without updating, “requests with a path starting /webhooks/aws could be blocked at an upstream proxy.”The popular open source discussion platform attracts millions of users every month, prompting the message from CISA urging updates to be pushed through. Researchers have detailed the finer points of the problem in blog posts and reported the issue to Discourse, which did not respond to requests for comment. BleepingComputer conducted a search on Shodan that found all Discourse SaaS instances have been patched. Saryu Nayyar, CEO of cybersecurity company Gurucul, said Discourse “continues to make news after researchers discovered a vulnerability that enabled attackers to invoke OS commands at the Administrator level.” 

    “It’s critically important for both systems administrators and individual users to keep up with security information from software providers and to install patches promptly. We can’t rely on Microsoft or other OS vendors to automatically push patches to our systems. Users of Discourse software should test and install this patch as their most important priority,” Nayyar said. “Most user computers don’t have computer admin access. If the only admin access on a computer is through the network administrator account, if you can execute using admin access, hackers have the potential to send a command that can compromise the entire network.”Haystack Solutions CEO Doug Britton said the vulnerability is dangerous because it can be run remotely without already being an authenticated user on the victim server.”Level 10 bugs are undoubtedly the most serious vulnerabilities. Discourse is a major communications platform,” Britton said.  More

  • in

    These ransomware criminals lost millions of dollars in payments when researchers secretly found mistakes in their code

    A major ransomware operation was prevented from making millions of dollars after cybersecurity researchers discovered a flaw in the ransomware that enabled encrypted files to be recovered without paying a ransom to cyber criminals.

    learn more

    Cybersecurity researchers at Emsisoft have detailed how they were secretly able to foil the cyber criminals behind BlackMatter ransomware, saving several victims from having to pay the ransom. After keeping what they were doing under wraps to avoid the cyber criminals finding out, researchers have now disclosed how they were undermining BlackMatter by providing decryption keys to victims of their attacks. BlackMatter has been active in its current incarnation since July this year, but has actually been around for a lot longer than that because the consensus among information security analysts is that BlackMatter is a rebranded version of DarkSide ransomware.  DarkSide became notorious earlier this year as the culprits behind the Colonial Pipeline ransomware attack. The incident led to shortages of gas and fuel across the US North Eastern seaboard while the criminals walked away with millions of dollars when Colonial paid the ransom. But the impact of the attack didn’t go unnoticed and shortly after the White House vowed action against those responsible, DarkSide lost control of part of their critical infrastructure and some of their Bitcoin wallets were seized. The group seemed to go dark after that.  However, DarkSide soon re-emerged as BlackMatter and the cyber criminals behind it don’t appear to have been put off by finding themselves in the sights of the US government. They have gone onto launch a string of ransomware attacks against companies in North America. 

    Posts by BlackMatter on underground forums offering to buy access to compromised networks in the USA, Canada, the UK, and Australia claimed that BlackMatter wouldn’t go after hospitals or state institutions. But this was untrue, and in addition to critical infrastructure in the form of several agricultural companies, the group has also struck blood testing facilities. SEE: A winning strategy for cybersecurity (ZDNet special report)     “The gang’s claim that attacks on the critical infrastructure and certain other sectors was empty: it attacked the very organisations it said it would not,” Brett Callow, threat analyst at Emsisoft told ZDNet.   “So why did they make the claim in the first place? It may have been an attempt to avoid attracting immediate attention from law enforcement agencies in the aftermath of the Colonial Pipeline incident or, perhaps, they believed that companies would be more inclined to negotiate if they didn’t appear to be thugs who attacked hospitals”. In December last year, Emsisoft researchers noticed a mistake made by the DarkSide operators that allowed the decryption of data encrypted by the Windows version of the ransomware without the need for a ransom to be paid — although the criminals fixed it in January.   However, it turns out that the ransomware group made a similar mistake once again when they rebranded, and researchers uncovered a flaw in the BlackMatter ransomware payload which allowed victims to recover files without paying the ransom. After uncovering the second vulnerability, Emsisoft worked with others to provide as many BlackMatter victims as possible with the decryption key before they paid the ransom, a move that has prevented cyber criminals from pocketing tens of millions of dollars.  Unfortunately, BlackMatter eventually figured out that something was wrong and closed the loophole.  “BlackMatter will likely have suspected something was amiss when their revenue started to dip, and will have become more suspicious the longer it went on. Unfortunately, it’s inevitable that gangs will realise they have a problem in these situations. All we can do is work quickly and quietly to help as many victims as we possibly can while the windows of opportunity exist,” said Callow.  “This effort shows the importance of public-private sector collaboration. Working together, we can put a big dent in the profitability of cybercrime, and that’s a key element in combatting the ransomware problem,” he added. Ransomware remains a major information security issue and the best way to avoid having to react to attack is to not become a victim in the first place. Cybersecurity strategies like applying security patches in a timely manner, ensuring multi-factor authentication is applied across the network, and only providing users with the access they need — for example, by not giving admin privileges to people who don’t need them — can all help prevent ransomware attacks.  As for BlackMatter, it’s likely they’ll carry on — but their mistakes may have damaged their reputation in cyber criminal circles.  “I wouldn’t be at all surprised if the operators were to abandon the BlackMatter name and rebrand. Their reputation will be in the  toilet. Their repeated mistakes have cost affiliates money. Lots of money,” said Callow.
    MORE ON CYBERSECURITY More