1 min read

Huawei Hands In Source Code to Fight Cyber-Espionage Accusations

Loredana BOTEZATU

October 26, 2012

Huawei Hands In Source Code to Fight Cyber-Espionage Accusations

Huawei, one of China`s largest networking and telecom hardware providers, has offered the Australian government access to the company`s source code to fight cyber-espionage accusations issued earlier this month by the Intelligence Committee of the US House of Representatives.

After being publicly blamed for bundling their device firmware with backdoors, Huawei is trying to clear its name and keep its ties with worldwide customers. According to a report by the BBC, the US advisory puts the Chinese telecom hardware provider in an extremely weak position and banned it from bidding on contracts for development of the Australian broadband network.

Huawei has done a very poor job of communicating about ourselves and we must take full responsibility for that,” said John Lord, chairman of Huawei’s Australian division.

Unrestricted access to the source code will allow the Australian government to easily comb through what exactly the networking gear shipped by the Chinese vendor is capable of and ensure that there is no security risk for companies that rely on Huawei products.

Networking equipment is a key component of corporate and government infrastructures as they carry all inbound and outbound traffic. If a foreign government had access to the routers, they could snoop on traffic and intercept confidential information with no problem.

This is not the first time Huawei has been regarded with suspicion over its alleged ties with the Chinese government and its involvement in cyber-warfare. However, a White House report released last week revealed no evidence of interference by the Chinese government in the Huawei products.

tags


Author



Right now

Top posts

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read
Mobile security threats: reality or myth?

Mobile security threats: reality or myth?

June 13, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands
Graham CLULEY

July 23, 2021

3 min read
Homoglyph domains used in BEC scams shut down by Microsoft Homoglyph domains used in BEC scams shut down by Microsoft
Graham CLULEY

July 22, 2021

3 min read
China Sets Up New Worrying Vulnerability Disclosure Rules China Sets Up New Worrying Vulnerability Disclosure Rules
Silviu STAHIE

July 20, 2021

1 min read