My latest articles

Huawei ERNW 5G Source Code Analysis

Does the positive review of Huawei UDG source code quality mean that Huawei 5G is secure and reliable?

No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an independent IT security service provider in Germany, recently performed a technical review / audit of Huawei’s...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common...
5G Virtualization

Unlocking the Future – Why Virtualization Is the Key to 5G

Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human Evolution?

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense. The authors go on: wicked problems, such...

Latest industry news

S.3469 NETWORK Act

U.S. lawmakers introduce bill targeting Huawei for industrial espionage

A bipartisan group of U.S. lawmakers today introduced in Senate a bill aimed "To impose sanctions with respect to foreign telecommunications companies engaged in...
Bell Canada 5G

Bell Canada to pause 5G launch due to COVID-19

On Bell's BCE Inc (BCE) Q1 2020 Results Conference Call on Thursday new Bell's President and CEO Mirko Bibic said: "We are ready with...
TeraGo 5G

TeraGo commences 5G fixed wireless technical trials in Toronto

TeraGo Inc. (“TeraGo” or the “Company”) (TSX: TGO, www.terago.ca) is a Canadian managed cloud and connectivity solutions company. It owns a national spectrum portfolio...
The Next Gen Future 5G Australia

Report: Inquiry into the deployment, adoption and application of 5G in AU

Australian government's committee - The House of Representatives Standing Committee on Communications and the Arts - has issued a new report on adoption of...

3GPP delays releases 16 and 17 for three months

In response to COVID-19 3GPP has delayed the next two 5G standards releases - releases 16 and 17 - by three months. 3GPP Release 16...
UK 5G Huawei

Huawei Greenlit for U.K.’s 5G Network

The U.K. government greenlit Huawei for a limited role in the U.K.'s fifth-generation telecommunications networks. This is a blow for American efforts of the...
Rogers 5G Vancouver

Rogers begins 5G rollout in Vancouver, Toronto, Ottawa and Montreal

Rogers announced it is starting to roll out Canada’s first 5G network in downtown Vancouver, Toronto, Ottawa and Montreal so it is ready when...
5G Threat Landscape

ENISA published “Threat Landscape of 5G Networks”

ENISA, the EU's always excellent cybersecurity watchdog, published "Threat Landscape of 5G Networks", a report on threats relating to 5G networks. The report presents...
Huawei Position Paper Cybersecurity 5G

Huawei releases its position paper on cyber security

Today Huawei released its position paper on cyber security. The paper is an excellent summary of 5G security risks, latest standards and industry developments...
Accelerating 5G in Canada Report

5G Will Have Significant Positive Impacts for Canadians

Cities and rural communities across Canada will see significant economic and quality-of-life benefits as 5G is deployed. According to a new report commissioned by the...
Canada Huawei 5G

Canadian Intelligence Agencies Disagree on Huawei Ban – Media

According to a recent media report, Canadian key intelligence agencies - the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) -...
UBC Rogers 5G

Rogers Opens First 5G-Powered Smart Campus at UBC

Rogers Communications, together with the University of British Columbia (UBC), announced the launch of what it claims to be Canada’s first 5G-powered smart campus...
Ericsson Concordia 5G

Ericsson Extends 5G Security Partnership with Concordia University

Ericsson has extended a 5G security partnership with Concordia University in Montreal, Canada, through a new industrial research chair awarded by the Natural Sciences...
Encqor Canada 5G

ENCQOR 5G Launches First Public mmWave Service in Canada

ENCQOR 5G (Evolution of Networked Services through a Corridor in Québec and Ontario for Research and Innovation) industry partnership announced that Canada's first publicly...
GSMA North America 5G

GSMA Report Highlights North America’s Global 5G Leadership

A new GSMA report highlights North America's global 5G leadership. The report - The Mobile EconomyNorth America 2019 - part of GSMA’s ongoing Mobile...

About me

Marin Ivezic

Marin Ivezic is a Cybersecurity & Privacy Partner in PwC Canada focused on risks of emerging technologies. He leads PwC’s global 5G cybersecurity efforts as well as industrial, IoT and critical infrastructure cybersecurity services in the region. All these focus areas are being transformed with the emergence of 5G, massive IoT (mIoT) and critical IoT (cIoT).
[This is a personal blog with guest contributors. All information is provided on an as-is basis. Any views or opinions represented here are personal and belong solely to the author and do not represent those of people, institutions or organizations that the author may or may not be associated with in professional or personal capacity. See Terms of Use.]

Most popular articles this week

My books

5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the world is radically changing. We interact with physical objects and systems well beyond our sight and comprehension. Our cars, homes, factories and public transportation are controlled increasingly by computer chips and sensors. This interconnectedness already exceeds much of last century’s science fiction imaginings, but is poised to accelerate even more dramatically with the advent of 5G. Popular telecom carrier driven expectations about the speed and capacity of 5G consumer mobile...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered...
US vs China 5G

Geopolitics of 5G and 5G-Connected Massive & Critical IoT

Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the platform, owns the customer.” This race to be the first to establish technological platforms and lock-in their customers is increasingly becoming politicized. And 5G, the next generation of cellular...
Cybersecurity IoT 5G Cyber-Kinetic Risks

Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to describe one's hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What's not so smart, though, is the way the cybersecurity and cyber-kinetic security risks of these systems are often overlooked, and with new horizon technologies like 5G, these problems are set to grow exponentially.
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management, traffic congestion and connectivity? In response to these wicked problems, cities are increasingly relying on smart technologies to foster greater efficiency and sustainable growth. These interventions do not, however,...
AI Three Futures

Three Views of Artificial Intelligence (AI) Future

If you’ve read the many predictions about the future of AI, you’ve likely found them to be wildly different. They range from AI spelling doom for humanity, to AI ushering in Golden Age of peace, harmony and culture, to AI producing barely a blip on society’s path toward ever-greater technological achievement. Those three views – dystopian, utopian and organic – present issues we need to consider as we move deeper toward an AI-integrated future. Yet they also contain exaggerations and false assumptions that we need to separate from reality. The Dystopian...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a hundred years of evolutionary theory. It proposed that millions of years ago, the eukaryotes emerged not from competition, as neo-Darwinism asserts, but from collaboration. Margulis’ research showed how single-celled lifeforms working together created an entirely new organism that became the foundation of all advanced life on earth. This was an inflection point in the development of evolutionary biology, shifting the scientific and cultural narrative away from “survival of the fittest” towards “survival of the most cooperative.” Though competition contributes to better individual or organizational performance, it...
Quantum Computer 5G Security

The Quantum Computing Threat to 5G Security

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers...

Resources

@5GSec Twitter

5G will change the world - but who will keep it safe? - why is 5G so different from what has come before, and what new security threats does it pose? https://5gs.ec/2zAqPH3

Officials warn of increasing cyber threats to critical infrastructure during pandemic - "A significant cyberattack is not unthinkable, we know that it is being planned, and we know that it is happening today" #cybersecurity #criticalinfrastructure https://5gs.ec/2XE3gWj

Regulating the Security of the Internet of Things (IoT) in a 5G World - http://5G.Security Marin Ivezic - If there’s one thing everyone agrees on, it’s the need for some sort of global standard to encourage greater alignment and better #IoT #security https://5gs.ec/2zsxnXH

AI Uses Today – Far More Than You Might Think - Marin Ivezic - #AI and ML have already made far greater inroads into our lives today than most people realize. They are increasingly expanding human capabilities and taking over an increasing number of tasks https://5gs.ec/2LpxVR0

Hacking the PLC via Its Engineering Software - Attackers don't need to directly hack into a programmable logic controller (PLC) to wreak havoc on an industrial process: they can target its configuration files and pivot from there. #cybersecurity #ICS https://5gs.ec/2EWVAIi

Enhancing National #Cybersecurity with the Internet of Things (IoT) - "There are several potential barriers to delivering on the promise of #IoT. Intel prioritizes security and recommends the following actions to address this challenge:" https://5gs.ec/3a5xwi7

Alert: Chinese Malware Targeting IT Service Providers - A trio of U.S. government agencies is warning organizations, especially IT service providers, about a hacking campaign using a malware strain that has previously been tied to Chinese hackers https://5gs.ec/30EqZI5

BAE Systems, Nissan line up behind new £30m UK fund for industrial 5G - The UK government has awarded £30 million to six new 5G testbeds, as part of a wider £200 million campaign to leverage #5G to energise the UK industrial sector #Industry40 https://5gs.ec/2C8cDpM

Tangible Threat of #CyberKinetic Attacks - http://5G.Security Marin Ivezic - Connecting physical objects and processes to the cyber world offers us enormous capabilities. But it also introduces disquieting possibilities. #Cybersecurity #IoT #4IR https://5gs.ec/2zBoif2

Black Hat 2020: 'Zero-Click' MacOS Exploit Chain Uses Microsoft Office Macros - A new “zero-click” MacOS exploit chain bypasses security measures that both Microsoft and Apple have put in place to protect MacOS users from malicious macros. https://5gs.ec/33E9eKT

WSJ News Exclusive | U.S. Government Contractor Embedded Software in Apps to Track Phones - Anomaly Six has ties to military, intelligence agencies and draws location data from more than 500 apps with hundreds of millions of users https://5gs.ec/2EZF9eh

Malware attacks abusing machine identities grew 8x over the last 10 years - Help Net Security - "Machine identity capabilities have become commoditized and are being added to off-the-shelf malware, making it more sophisticated and harder to detect." https://5gs.ec/3imBgyB

NB-IoT vs LTE-M: Which is the best choice for your IoT application? - IoT Now - NB-IoT and LTE-M have entered the market as two new network technologies created for enabling global #IoT connectivity https://5gs.ec/2PjcHpB

Nokia, Hurt by Costly #5G Chip Mistake, Struggles to Catch Huawei - After losing market share to the Chinese firm and rival Ericsson, the Finnish giant reverses course on computer processors https://5gs.ec/2DxF4Oa

Mandating MVNOs would have significant negative impacts on Canada’s economy: PwC study - CWTA. #5G https://5gs.ec/39SBzxV

Software bug in Bombardier airliner made planes turn the wrong way - Cold weather missed approaches went left instead of right - and vice versa https://5gs.ec/3dhxQLp

Load More...
5G Opportunity and Cybersecurity
Copy link