Monday, April 14, 2025
HomeSecurity NewsU.S Military Banned Smartphones that Made by ZTE and Huawei

U.S Military Banned Smartphones that Made by ZTE and Huawei

Published on

SIEM as a Service

Follow Us on Google News

Pentagon banned Smartphones that have been made by Chinese firms ZTE and Huawei to be used in any military services of U.S.

Also the ordered US military bases retail to stop selling the  ZTE and Huawei smartphones due to surveillance precautions.

Pentagon urged to take this action due to Chinese producers could be influenced by the authorities in Beijing to plant code that could spy on servicemen, or even remotely impair communications.

- Advertisement - Google News

New rules proposed by Pentagon states, Wireless carriers and organizations should not use the federal funds such as “buy networking hardware or administrations from purchase equipment or services from companies that pose a national security threat to United States communications networks or the communications supply chain.”

Also Read:  NSA Collected 534 Million Records of Phone Calls and Text Messages of Americans

According to Wall Street Journal reports, Pentagon officials believe that Huawei and ZTE devices may pose an unacceptable risk to the department’s personnel, information and mission.

An official statement said, It because of national security posed as Hidden ‘backdoors’ to our networks in routers, switches—and virtually any other type of telecommunications equipment—can provide an avenue for hostile governments to inject viruses, launch denial-of-service attacks, steal data, and more.

This ban against ZTE and Huawei was taken on April 25 and Given security concerns about ZTE cell phones and related products, the Pentagon’s exchange services also removed ZTE product.

ZTE Did not comment about this ban but Huawei states that “We remain committed to openness and transparency in everything we do and want to be clear that no government has ever asked us to compromise the security or integrity of any of our networks or devices,”.

Apart from this, the U.S, UK, and India based intelligence services also warned about the risks of using ZTE equipment and services for their infrastructure.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

DoJ Launches Critical National Security Program to Protect Americans’ Sensitive Data

The U.S. Department of Justice has launched a landmark initiative to block foreign adversaries—including...

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...