New York, Nov 13 (AP/UNB) -An internet diversion that rerouted data traffic through Russia and China disrupted several Google services on Monday, including search and cloud-hosting services.
Service interruptions lasted for nearly two hours and ended about 5:30 p.m. EST., network service companies said. In addition to Russian and Chinese telecommunications companies, a Nigerian internet provider was also involved.
Google confirmed Monday's disruption on a network status page but said only that it believed the cause was "external to Google ." The company had little additional comment.
The specific method employed, formally known as border gateway protocol hijacking, can knock essential services offline and facilitate espionage and financial theft. Most network traffic to Google services —94 percent as of October 27 — is encrypted, which shields it from prying eyes even if diverted.
Alex Henthorn-Iwane, an executive at the network-intelligence company ThousandEyes, called Monday's incident the worst affecting Google that his company has seen.
He said he suspected nation-state involvement because the traffic was effectively landing at state-run China Telecom. A recent study by U.S. Naval War College and Tel Aviv University scholars says China systematically hijacks and diverts U.S. internet traffic.
Much of the internet's underpinnings are built on trust, a relic of the good intentions its designers assumed of users. One consequence: little can be done if a nation-state or someone with access to a major internet provider decides to reroute traffic.
Henthorn-Iwane says Monday's hijacking may have been "a war-game experiment."
In two recent cases, such rerouting has affected financial sites. In April 2017, one affected Mastercard and Visa among other sites. This past April, another hijacking enabled cryptocurrency theft .
The Department of Homeland Security did not immediately respond to a request for comment.
ThousandEyes named the companies involved in Monday's incident, in addition to China Telecom, as the Russian internet provider Transtelecom and the Nigerian ISP MainOne.
Dhaka, Nov 12 (UNB) – Mobile operator Robi has launched an IoT-based telco enterprise solution-- Smart Attendance Solution.
Smart Attendance Solution is a complete end-to-end attendance and tracking solution with a smart device that is able to make calls and send SMS to a select group of people.
Robi’s Managing Director and CEO Mahtab Uddin Ahmed inaugurated the innovative digital solution at the Robi Corporate Office, said a press release.
Robi’s Head of Enterprise Business Md Adil Hossain and Vice-president (Enterprise Business) Zayed Sadat were present on the occasion.
Initially, the solution will be promoted in schools to keep the parents updated on their children’s whereabouts. Parents will receive SMS notification when their children enter and leave their respective schools.
When the children leave the school compound, parents will be able to track their location via mobile apps. The smart device also has an emergency button where calls will be made to parents and their exact location will be shown.
San Diego, Nov 12 (AsiaNet/UNB) -Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated today announced it has shared its Device Identification, Registration, and Blocking System (DIRBS) platform as freely downloadable open-source software.
Qualcomm Technologies' DIRBS server-based software platform can be used to help identify counterfeit, illegal, and stolen mobile devices in a country. The DIRBS software platform will help regulatory agencies classify devices and generate IMEI-based lists for notification, amnesty, and blocking purposes.
DIRBS has been successfully deployed in Pakistan, and deployments are anticipated in several other markets in the coming months.
"Counterfeit devices are a significant problem worldwide and result in an estimated 45.3 billion EUR in lost sales to genuine manufacturers each year, according to a recent European Union Intellectual Property Office Study issued in February of 2017," said Mohammad Raheel Kamal, Senior Director, IPR Enforcement, Qualcomm Incorporated.
"Sharing the DIRBS solution as freely downloadable open-source software will allow the mobile industry to rapidly implement this powerful technology to help address counterfeiting and related issues around the globe."
"Qualcomm is committed to enriching the mobile ecosystem, including assisting regulatory agencies in addressing their needs for security with respect to cellular-enabled devices," said John Han, SVP, Qualcomm Incorporated and GM, Qualcomm Technology Licensing. "We are excited to share the DIRBS software platform to help enable regulatory agencies to further fight the proliferation of counterfeit, illegal and stolen devices."
The DIRBS server-based software platform will be hosted on the open-source software website Github [https://github.com/dirbs ], and may be freely downloaded and used by any interested parties.
Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates. When we connected the phone to the
Internet, the mobile revolution was born. Today, our inventions are the foundation for life-changing products, experiences, and industries. As we lead the world to 5G, we envision this next big change in cellular technology spurring a new era of intelligent, connected devices and enabling new opportunities in connected cars, remote delivery of health care services, and the IoT - including smart cities, smart homes, and wearable.
Qualcomm Incorporated includes our licensing business, QTL, and the vast majority of our patent portfolio. Qualcomm Technologies, Inc., a subsidiary of Qualcomm
Incorporated, operates, along with its subsidiaries, all of our engineering, research and development functions, and all of our products and services businesses, including, the QCT semiconductor business.
SOURCE: Qualcomm Technologies
Dhaka, Nov 11 (UNB) – Bangladesh Telecom Regulatory Commission (BTRC) has seized 42,000 SIM cards, used for illegally routing international calls through voice over internet protocol (VoIP), during separate raids in the capital and port city in October.
Of the SIMs, 16,812 were of Robi, 15,949 of Teletalk, 6,176 of Banglalink and 3,223 of Grameenphone, said Md Jahurul Haque, acting chairman of the telecom watchdog at a press conference at his office on Sunday.
The seizure will save the loss of revenue over Tk 867 crore annually, he said adding that a total of 24 people have been arrested along with the SIMs and equipment valued worth TK 1.23 crore.
A joint team of BTRC and Rab conducted the drives in Dhanmondi, Tejgaon, Kadamtoli, Siddirganj, Pallabi and Mirpur from October 14-18 and Bayazid Bostami, Panchlaish, Baklia, Chawkbazar, Chandgaon, Sadarghat and Halishahar areas of the port city from October 21-31.
A total 28 cases were filed in connection with the seizure.
Dhaka, Nov 10 (UNB) -A man has been jailed for sending a "potentially lethal homemade bomb" to a Bitcoin firm in London - after it refused to reset his password for him.The Met Police, which investigated the case, said detectives could "only identify one possible reason" for the Swedish national's actions.
He faced a number of charges, including some for sending a white powder to Swedish lawmakers - among them, the prime minister - in 2017.Salonen had addressed a padded envelope containing the device to two Cryptopay employees.It was delivered at some point in November 2017 to an office in Hackney, which had housed an accountancy firm previously used by Cryptopay.
Several months later, on 8 March 2018, a worker at the office began opening the package but did not continue when they became suspicious of what was inside."We are relieved that no one from The Accountancy Cloud team was hurt in this incident," a spokesman for Cryptopay told the BBC. "None of our employees have ever worked at that address."
"The vast majority of our employees work remotely across Europe, but we are implementing additional security measures to prevent any potential harm to our employees anyway."We are thankful for both British and Swedish police, who were able to investigate the case with outstanding professionalism."
"It was due to sheer luck that the recipient ripped opened the package in the middle rather than using the envelope flap which would have activated the device," said Commander Clarke Jarrett at the Met Police Counter Terrorism Command.DNA found in the package did not match information on UK databases, so it was analysed by Interpol.
"Through these inquiries, it was identified that the DNA matched those of Salonen, who was known to Swedish authorities," the Met says. A search of Salonen's home discovered "numerous bomb components".