Monday, 21 November 2016 19:17

Alcatel Australia boss says no spyware here! Featured


It is a sad day when we are talking about spyware on smartphones sending personally identifiable information to China and the fact that some global companies think it is OK to take security and privacy away from consumers.

So, begins Sam Skontos, vice-president and regional managing director South-east Asia and Pacific, for Alcatel – not one of the Chinese smartphone makers caught receiving sensitive data from its smartphone users. (iTWire article here).

Alcatel SkontosSkontos was in full flight or is that full fight. “We work so damned hard to establish a Chinese brand in Australia and do absolutely the right thing. Then some Chinese manufacturers come into the markets, do not disclose this type of activity to anyone including industry stakeholders, and show no regard whatsoever for consumer security and privacy laws, until of course they are caught out.

“The damage has been done, and questions need to be asked about why this spyware was on their handsets in the first place,” he fumed. “Alcatel and its parent company, TCT Mobile, has no relationship with Adups and has no such firmware on any of its devices," he added.

For the record Alcatel/TCT Mobile conducts their Firmware Over The Air (FOTA) updates through its own in-house servers, not through third-party suppliers.

Skontos softens a little and cautions, “Do not tar all Chinese companies with the same brush. Alcatel has a significant local presence and works hard to localise every single device. You will not find any such spyware on our devices because we respect our customers and the right to strictly protect their privacy and security. The responses so far from those companies named should only worry consumers and authorities more.”

Spyware found and used by Adups Technology on behalf of various Chinese manufacturers was analysed by Kryptowire.

These devices actively transmitted user and device information including the full-body of text messages, contact lists, call history with full telephone numbers, unique device identifiers including the International Mobile Subscriber Identity (IMSI) and the International Mobile Equipment Identity (IMEI).

The firmware could target specific users and text messages matching remotely defined keywords. The firmware also collected and transmitted information about the use of applications installed on the monitored device, bypassed the Android permission model, executed remote commands with escalated (system) privileges, and could remotely reprogram the devices.

The firmware that shipped with the mobile devices and subsequent updates allowed for the remote installation of applications without the users' consent and, in some versions of the software, the transmission of fine-grained device location information.

Some handsets transmitted the body of the user's text messages and call logs to a server in located in Shanghai. All of the data collection and transmission capabilities identified were supported by two system applications that cannot be disabled by the end user.

There is a good article here on how to identify and remove the Adups software using “Debloater”.

Related: Laptop Tablet Review: Alcatel PLUS12 2in1

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Ray Shaw

joomla stats

Ray Shaw  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!



Recent Comments