TP-Link routers are being investigated by several US authorities


According to various US authorities are investigating TP-Link routers, linking them to Chinese-backed cyberattacks. The Commerce, Justice and Defense departments each have their own investigations, and sources told the Journal the Commerce Department subpoenaed TP-Link. These investigations may contribute to a potential ban on routers next year.

In September, the Journal reported a wave of in the US involving many TP-Link routers. The attackers targeted government organizations and Defense Department suppliers, as well as non-governmental organizations and think tanks.

TP-Link currently holds about 65 percent of the US router market for small businesses and homes. It is also widely used by the Department of Defense and NASA. But sources told the Journal that the devices often send security errors, and that the company has failed to address these issues or engage with the security community.

“We welcome any opportunities to engage with the US government to demonstrate that our security practices are fully compliant with industry security standards, and to demonstrate our continued commitment to the US market, US consumers, and addressing US national security risks,” a TP-Link spokesperson said WSJ.

Excluding TP-Link routers, this would be the largest takeover of Chinese telecom equipment in the US since 2019 .

If you purchase something through a link in this article, we may earn a commission.



Source link

  • Related Posts

    Anker’s latest charger from CES 2025 has been discounted

    Just a few days after Anker announced it 140W four port wall charger on CES 2025already sold. The charging brick has a display (which allows you to keep tabs on…

    T-Mobile and SpaceX Turn on Satellite Texting for Los Angeles Fires

    as Fires continue to ravage the Los Angeles area, T-Mobile and SpaceX announced on Thursday evening that they will turn on Starlink coverage for those who need it. “Today T-Mobile…

    Leave a Reply

    Your email address will not be published. Required fields are marked *