AST SpaceMobile satellite placed into wrong orbit


Posted by Harry Baldock : The failed deployment could hinder commercial pilots of direct-to-device (D2D) services for AST’s mobile operator partners

Satellite company AST SpaceMobile has hit a setback this week, with its latest BlueBird 7 satellite being deployed in the wrong orbit.

The launch, which took pace on Sunday, saw BlueBird 7 carried into low Earth Orbit (LEO) by Blue Origin’s New Glenn reusable rocket. However, issues in deployment led to the satellite being placed into too low an orbit.

“During the New Glenn 3 mission, BlueBird 7 was placed into a lower than planned orbit by the upper stage of the launch vehicle. While the satellite separated from the launch vehicle and powered on, the altitude is too low to sustain operations with its on-board thruster technology and will [be] de-orbited,” explained AST SpaceMobile in a statement, noting that the cost of the lost satellite was covered by an insurance policy.

AST is currently in the process of deploying a constellation of roughly 90 LEO satellites, which will be used to provide global coverage of D2D satellite services. This will allow AST’s mobile operator partners, such as Vodafone and AT&T, to provide customers with coverage beyond the limits of their terrestrial networks.

AST currently has six active satellites in orbit, which provide intermittent coverage and have primarily been used for preliminary tests of the company’s D2D technology. BlueBird 7 was set to be the first of the company’s upgraded satellites, with 45–60 additional devices targeted for launch before the end of the year.

“The company is currently in production through BlueBird 32, with BlueBird 8 to 10 expected to be ready to ship in approximately 30 days,” said the company statement. “The company continues to expect an orbital launch every one to two months on average during 2026, supported by agreements with multiple launch providers, and it continues to target approximately 45 satellites in orbit by the end of 2026.”The extent to which the failure to deliver BlueBird7 will impact AST’s customers is unclear. VodafoneThree, for example, is scheduled to begin trials of the technology with customers this summer. AST SpaceMobile satellite placed into wrong orbit - Total Telecom
Read More........

Your smart home can be easily hacked. New safety standards will help, but stay vigilant

Yang Xiang, Swinburne University of Technology

On a quiet suburban street, a modern Australian home wakes before its owners do.

The lights turn on automatically, the thermostat adjusts to a comfortable temperature, and the coffee machine begins brewing. A doorbell camera watches the front yard, a baby monitor streams live footage to a parent’s phone, and a smart speaker waits for its next command.

This is the promise of the smart home: convenience, efficiency and peace of mind.

But behind this smooth experience is a hidden risk: every connected device can also be a way for cyber attackers to get in.

The Australian government has responded by introducing minimum security standards for smart devices to better protect households in this increasingly connected world.

These standards recently took effect. So what’s in them? And are they sufficient to keep people safe?

Starting with manufacturers

From my experience working in cybersecurity, I’ve seen that security risks start from manufacturers themselves.

Many smart devices are not designed with security as a priority. Manufacturers often focus on keeping costs low, releasing products quickly, and making them easy to use. Security is treated as an afterthought.

For example, many devices arrive with weak default passwords such as “admin” or “1234”, which users rarely change. This creates an easy opportunity for attackers to gain access.

The Mirai botnet attack in 2016 clearly demonstrated the risks. In this case, hundreds of thousands of insecure devices such as doorbell cameras were hijacked to launch massive “distributed denial-of-service” (DDoS) attacks. This is a type of cyber attack where many computers or devices are used together to overwhelm a website, server, or network with traffic, so it becomes slow or completely unavailable to legitimate users.

More recent research has shown smart home devices can be exploited not only to disrupt systems but also to spy on households. In some cases, strangers have accessed baby monitors, and poorly secured cameras have exposed private footage online.

Another major issue is the lack of regular software updates.

Many low-cost or older devices don’t receive ongoing security patches, which means known software vulnerabilities remain open indefinitely. Attackers actively scan the internet for such devices, exploiting weaknesses at a large scale. Cloud-connected and AI-enabled systems amplify risks.

The consequences of these weaknesses go beyond individual households. Compromised devices can be used as part of larger cyber attacks, forming botnets that target critical infrastructure or businesses.

In effect, an insecure smart lightbulb or camera can become a building block in global cyber crime operations.

What are the new standards?

In response to these growing threats, the Australian government has begun introducing mandatory minimum security standards for connected devices.

These standards took effect earlier this month. They aim to establish a baseline level of protection across all products entering the market.

While the details of these standards may evolve, the key ideas are clear.

First, devices must not use universal default passwords. Each device should either require users to create a unique password during setup or be shipped with a unique credential.

Second, manufacturers must provide a clear vulnerability disclosure policy, allowing security researchers to report issues responsibly.

Third, there must be transparency around how long a device will receive security updates, so consumers can make informed decisions.

These changes shift some responsibility from users to manufacturers. Instead of expecting consumers to fix security problems themselves, devices must be designed to be safer from the start.

In practice, this means fewer vulnerabilities and greater accountability across the industry.

Regulation alone isn’t enough

However, regulation alone is not enough. Household behaviour still plays a critical role in maintaining security. Fortunately, some of the most effective steps are simple.

Changing default passwords to strong, unique ones is one of the most important steps. A strong password should be long, complex and not reused across multiple devices or accounts.

Enabling multi-factor authentication wherever possible adds a second layer of defence, making it significantly harder for attackers to gain access.

Regularly updating device firmware, also known as “software for hardware”, is equally important. Firmware updates often include patches for newly discovered vulnerabilities, and delaying them leaves devices exposed.

Users should also consider their home network design. Placing smart devices on a separate network, such as a guest wifi, can help isolate them from more sensitive information on personal or work devices.

Finally, choosing reputable manufacturers matters. Companies with a strong track record of providing ongoing security updates and transparent policies are generally safer choices than unknown or low-cost alternatives.

Smart homes are becoming an integral part of everyday life, and their benefits continue to grow. But as intelligence and automation expand, convenience must not come at the expense of security and trust.

With stronger standards, better-designed devices and more informed users, it is possible to enjoy the benefits of smart homes without exposing ourselves to unnecessary cyber risks.The Conversation

Yang Xiang, Professor, Computer Science, Swinburne University of Technology

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More........

France Bans Forever Chemicals in Cosmetics, Fashion, and Ski Wax

Christin Hume – Unsplash

Being that many of the so-called “forever chemicals” are involved in making products water-resistant, a French ban on their use in the textile, fashion, and cosmetics industries should serve to greatly reduce the nation’s population to their exposure.

There are hundreds of forever chemicals often called per or poly fluoroalkyl substances (PFAS) like perfluorooctanoic acid (PFOA) and perfluorooctane sulfonic acid (PFOS). They are used in the manufacturing of non-stick pans, waterproof clothing, waterproof treatments, ski wax, fire-fighting equipment, and much more.

Their exposure has been linked to numerous health conditions, from cancer to birth defects, and their presence has been recorded in most human organs, and in every Earthbound environment assayed for them, including the summit of Everest.

The French lower-house, the National Assembly, adopted the bill put forward by the Green Party with 231 votes to 51 in February of last year, following a green light from the Senate. 14 of the deputies tested their hair and presented the results on the floor as a demonstration—all of the samples contained forever chemicals.

Signed by President Emmanuel Macron, it entered into effect at the start of the year, and comes with a provision that will see the government routinely testing for PFAS in civic water supplies.

The legislation bans the chemicals’ use in clothing, cosmetics, ski wax, but fell short of including non-stick pan coatings. “Essential” emergency equipment was also exempt from the ban.

A ban in Denmark along similar lines will come into effect in July.Many of the known PFAS were banned in a UN treaty signed during the Stockholm Convention of 2001. 150 Member States ratified the treaty, but certain notable producers declined to do so. The European Union has been studying a possible ban on the use of PFAS in consumer products. France Bans Forever Chemicals in Cosmetics, Fashion, and Ski Wax
Read More........