Back to home
Technology

FCC votes to ban all Chinese labs from certifying electronics sold in the US due to national security concerns — ruling would affect 75 percent of US-bound devices

Source

Tom's Hardware

Published

TL;DR

AI Generated

The FCC unanimously voted to ban all Chinese labs from certifying electronics for sale in the U.S. due to national security concerns, affecting 75% of U.S.-bound devices. This move follows the FCC's ban on 15 state-owned or government-affiliated Chinese labs and extends to all remaining labs in China. The proposal also includes banning China Mobile, China Telecom, and China Unicom from operating data centers in the U.S. The FCC aims to limit interconnection capabilities with entities it deems security threats, with the ruling opening a public comment period before final implementation.

Read Full Article

Similar Articles

Amazon’s Middle East data centers damaged by Iran drone and missile attacks will be down for several months during repairs — U.S. and Iran currently observing an uneasy truce, but renewed strikes possible if talks break down

Amazon’s Middle East data centers damaged by Iran drone and missile attacks will be down for several months during repairs — U.S. and Iran currently observing an uneasy truce, but renewed strikes possible if talks break down

Amazon's data centers in the Middle East have been damaged by drone and missile attacks from Iran, leading to disruptions in services in Bahrain and the UAE. The repair process is expected to take several months, with customers advised to migrate resources to other regions. The ongoing conflict between the U.S. and Iran poses a risk of renewed strikes, making it challenging for Amazon to start repairs. Additionally, the damage caused by the attacks includes equipment destruction and system failures, further complicating the restoration process.

Tom's Hardware
Canonical under sustained DDoS attack as Ubuntu 26 releases — Iranian group 313 Team claims responsibility

Canonical under sustained DDoS attack as Ubuntu 26 releases — Iranian group 313 Team claims responsibility

Canonical, the company behind Ubuntu Linux, is facing a Distributed Denial of Service (DDoS) attack claimed by the Iranian group 313 Team. The attack has affected Canonical's infrastructure, causing slowdowns and outages on Ubuntu download and update mirrors, the main website, Launchpad, Snap store, and other services. Despite the attack coinciding with the release of Ubuntu 26 LTS, there have been no reported security compromises on package repositories or ISO images. Users are advised to access Ubuntu downloads from alternative non-Canonical sources during this period.

Tom's Hardware
Ubuntu infrastructure has been down for more than a day

Ubuntu infrastructure has been down for more than a day

Ubuntu and Canonical servers have been down for over a day due to a sustained, cross-border attack, hindering communication and updates for users. While attempts to access their webpages have failed, updates from mirror sites are still functioning. A group linked to the Iranian government has claimed responsibility for the outage, using a DDoS attack. This incident highlights the ongoing challenge of cyber attacks on tech infrastructure.

Ars Technica
Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.