


Major security risk! Micron products pose threat to China's critical information infrastructure
News on May 22: Recently, the China Cybersecurity Review Office conducted a cybersecurity review of products sold in China by US storage solution provider Micron in accordance with laws and regulations.
After review, it was found that Micron's products have serious cybersecurity issues, which may bring major security risks to China's critical information infrastructure supply chain and pose a threat to national security. Based on the need to safeguard national security, the Cybersecurity Review Office made a decision in accordance with the law and disapproved the cybersecurity review.
Operators of China's important information infrastructure should stop purchasing Micron products in accordance with the "Cybersecurity Law" and other relevant laws and regulations. This cyber security review of Micron's products aims to prevent cyber security problems that may be caused by the products to ensure the security of the country's critical information infrastructure. As long as companies, products and services comply with the requirements of Chinese laws and regulations, China has been actively promoting high-level opening up and welcomes them to enter the Chinese market.
According to ITBEAR Technology Information, Micron is an internationally renowned storage solution provider, and its products are widely used around the world. However, cybersecurity issues with the company's products have come into focus. The decision of the Cybersecurity Review Office will have an important impact on Micron's development in the Chinese market and will also remind other companies to pay more attention to cybersecurity issues in their product development and sales processes.
Although the Cybersecurity Review Office’s decision limits Micron’s business in China to a certain extent, it does not mean that China has closed the door to the company. China has been continuing to open up to the outside world and welcome companies and products that comply with regulations to enter the market, which is exactly the opposite. China is one of the world's largest consumer markets, providing foreign companies with huge business opportunities and development potential. Ensuring the network security and data security of products is the prerequisite and foundation for enterprises to cooperate with the Chinese market, which is crucial.
In short, the Cybersecurity Review Office conducted a cybersecurity review of Micron’s products in accordance with the law and concluded that they would not pass the review. China will continue to work hard to promote high-level opening up and create a stable and fair business environment for companies and products that meet the requirements.
The above is the detailed content of Major security risk! Micron products pose threat to China's critical information infrastructure. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



With the development of technology, the demand for smart wearable devices continues to rise. People now not only rely on watches to know the time, but also use smart watches or smart glasses to receive information, record exercise, detect health conditions, and more. However, these smart wearable devices also bring security risks. This article will discuss the safety hazards and solutions of smart wearable devices. 1. Security risks Data privacy leakage Smart wearable devices can collect a variety of personal data of users, such as physical health data, location data, social media activities, etc. However, these data may be

In the modern Internet architecture, Nginx, as an advanced web server and reverse proxy tool, is increasingly used in enterprise production environments. However, in actual use, administrators need to perform security downgrade operations on Nginx due to various reasons. Security downgrade means minimizing the security threats that the system exposes to the outside world while ensuring normal system functions. This article will explore the security risks and management best practices of using Nginx for secure downgrade. 1. Security Risks Using Nginx for Security

Serialization in PHP is a process of converting objects or data structures into strings, which are mainly implemented through serialize() and unserialize() functions. Serialization is used to save object state for delivery between different requests or systems. Potential security risks include object injection attacks and information leakage. Avoiding methods include: 1. Limit deserialized classes and use the second parameter of the unserialize() function; 2. Verify the data source to ensure it comes from a trusted source; 3. Consider using more secure data formats such as JSON.

Database security risks caused by insufficient OracleDBA permissions With the rapid development of the Internet, databases, as an important information storage and management tool for enterprises, carry a large amount of sensitive data. In this process, the database administrator (DBA) plays a vital role and is responsible for ensuring the normal operation of the database and the security of the data. However, due to work requirements or management policies, the DBA's authority is sometimes restricted, which may cause database security risks. This article will introduce the possible consequences of insufficient DBA authority in Oracle database

With the continuous development of information technology, virtualization technology has become one of the important supporting technologies for modern enterprise informatization. With the help of virtualization technology, enterprises can virtualize multiple physical hosts into one or more virtual hosts, thereby maximizing resource utilization, improving server usage efficiency, and reducing enterprise operating costs. At the same time, virtualization technology can also improve the business continuity and flexibility of enterprises by implementing functions such as isolation, dynamic migration, and snapshot backup of virtual machines. However, although virtualization technology brings many benefits, it also creates

Since ChatGPT was officially launched in November 2022, millions of users have poured in crazily. Due to its excellent human-like language generation capabilities, programming software talent, and lightning-fast text analysis capabilities, ChatGPT has quickly become the tool of choice for developers, researchers, and everyday users. As with any disruptive technology, generative AI systems like ChatGPT have potential risks. In particular, major players in the technology industry, national intelligence agencies, and other government agencies have issued warnings about feeding sensitive information into artificial intelligence systems such as ChatGPT. Concerns about the security risks posed by ChatGPT stem from the possibility that information could ultimately be leaked into the public domain through ChatGPT, whether through security

As one of the most popular content management systems in the world, WordPress’s security evolution has also attracted much attention over time. This article will examine WordPress security risks and protective measures in different years to help readers better understand the development process of WordPress security. When WordPress was first launched in 2003, security threats at the time focused on basic vulnerabilities and weak passwords. Although the first version of WordPress was relatively simple, security issues were not uncommon. website

According to news on May 22, China’s Cybersecurity Review Office recently conducted a cybersecurity review of products sold in China by US storage solution provider Micron in accordance with laws and regulations. After review, it was found that Micron's products have serious cybersecurity issues, which may bring major security risks to China's critical information infrastructure supply chain and pose a threat to national security. Based on the necessary measures to safeguard national security, the Cybersecurity Review Office concluded in accordance with the law that the cyber security review would not be passed. According to relevant laws and regulations such as the Cybersecurity Law, operators of critical information infrastructure in China should stop purchasing Micron products. This cyber security review of Micron's products aims to prevent cyber security problems that may be caused by the products to ensure that the country
