{"id":15025,"date":"2019-11-26T16:45:07","date_gmt":"2019-11-26T15:45:07","guid":{"rendered":"https:\/\/www.names.co.uk\/blog\/?p=15025"},"modified":"2019-11-26T16:45:07","modified_gmt":"2019-11-26T15:45:07","slug":"does-5g-present-a-golden-opportunity-for-hackers","status":"publish","type":"post","link":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/","title":{"rendered":"Does 5G present a golden opportunity for hackers?"},"content":{"rendered":"\n<p>The fifth generation (5G) mobile network offers many advantages in terms of speed. It allows faster, smoother downloads of video and other content. <\/p>\n\n\n\n<p>5G has the potential to change the way we use mobile data in both our business and personal lives so what implications does it have for online security? <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Device connections <\/h2>\n\n\n\n<p>The risk from 5G use is unlikely to come from the technology itself. 5G uses encryption and improved verification methods so it is significantly better than the earlier 3G and 4G standards. However, this does not mean it is protected from all threats. <br><br>In practice, the biggest issue is likely to come from the Internet of Things (IoT). 5G makes new data connections possible so there will be new ways to exploit devices. A whole range of  IoT devices including security cameras, smart speakers, fridges, baby monitors, medical devices and lots more are now connected to the internet and this presents online security risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Internet of Things (IoT) <\/h2>\n\n\n\n<p>There will be as many as 25 billion IoT devices by 2021. These are likely to attract hackers according to Gartner research. The problem is, low-cost IoT devices don\u2019t have the processing power to support the sophisticated security that computers and smartphones enjoy.<\/p>\n\n\n\n<p>Using 5G speed, hackers can rapidly scan devices for vulnerabilities like default passwords. Once a connected device is exploited, criminals can extract and transfer data quickly, before the attack is even discovered. <\/p>\n\n\n\n<p>Direct connections to mobile internet makes cyber attacks easier as there&#8217;s no added security of domestic routers and firewalls. It can also be an issue for businesses if employees use 5G instead of the secure network to access corporate data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New attacks on online security<\/h2>\n\n\n\n<p>While most 5G attacks are likely to have evolved from existing threats, it opens up some new avenues too. New technology incorporating artificial intelligence and so-called \u2018deep fakes\u2019 could lead to the creation of robot calls that imitate trusted friends or businesses.<br><br>As 5G becomes a key part of many countries\u2019 communication infrastructure, it will likely become a tempting target for nation-state attackers too. These attacks will seek to disrupt communications and other activity.<br><br>As with any technology, basic errors such as misconfiguration can leave online security vulnerable.  In an effort to prevent problems, communications providers and governments are scrambling to introduce security standards for 5G. It\u2019s important the risks are understood and corrected before they become a major threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The fifth generation (5G) mobile network offers many advantages in terms of speed. It allows faster, smoother downloads of video and other content. 5G has the potential to change the&#8230; <a class=\"more-link\" href=\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":17,"featured_media":14803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[],"class_list":["post-15025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Does 5G present a golden opportunity for hackers?<\/title>\n<meta name=\"description\" content=\"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does 5G present a golden opportunity for hackers?\" \/>\n<meta property=\"og:description\" content=\"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"names.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/namesco\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-26T15:45:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Namesco\" \/>\n<meta name=\"twitter:site\" content=\"@Namesco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\"},\"author\":{\"name\":\"Nathan\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"headline\":\"Does 5G present a golden opportunity for hackers?\",\"datePublished\":\"2019-11-26T15:45:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\"},\"wordCount\":410,\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\",\"url\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\",\"name\":\"Does 5G present a golden opportunity for hackers?\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"datePublished\":\"2019-11-26T15:45:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"description\":\"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage\",\"url\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"names.co.uk\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.names.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.names.co.uk\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Does 5G present a golden opportunity for hackers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.names.co.uk\/blog\/\",\"name\":\"names.co.uk blog\",\"description\":\"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.\",\"url\":\"https:\/\/www.names.co.uk\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does 5G present a golden opportunity for hackers?","description":"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/","og_locale":"en_GB","og_type":"article","og_title":"Does 5G present a golden opportunity for hackers?","og_description":"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.","og_url":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/","og_site_name":"names.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/namesco\/","article_published_time":"2019-11-26T15:45:07+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_card":"summary_large_image","twitter_creator":"@Namesco","twitter_site":"@Namesco","twitter_misc":{"Written by":"Nathan","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#article","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/"},"author":{"name":"Nathan","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"headline":"Does 5G present a golden opportunity for hackers?","datePublished":"2019-11-26T15:45:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/"},"wordCount":410,"image":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","articleSection":["Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/","url":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/","name":"Does 5G present a golden opportunity for hackers?","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","datePublished":"2019-11-26T15:45:07+00:00","author":{"@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"description":"In practice, the biggest threat to online security is likely to come from the new, fast data connections that 5G will make available.","breadcrumb":{"@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#primaryimage","url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","contentUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","width":945,"height":425,"caption":"cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.names.co.uk\/blog\/does-5g-present-a-golden-opportunity-for-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"names.co.uk","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.names.co.uk\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.names.co.uk\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"Does 5G present a golden opportunity for hackers?"}]},{"@type":"WebSite","@id":"https:\/\/www.names.co.uk\/blog\/#website","url":"https:\/\/www.names.co.uk\/blog\/","name":"names.co.uk blog","description":"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.","url":"https:\/\/www.names.co.uk\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=15025"}],"version-history":[{"count":19,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15025\/revisions"}],"predecessor-version":[{"id":15044,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15025\/revisions\/15044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media\/14803"}],"wp:attachment":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=15025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=15025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=15025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}