Malaysia Announces Transition to Dual Network Model for 5G Deployment

In a significant policy shift, Malaysia’s Communications Minister has officially ended the single wholesale 5G network, announcing a transition to a dual network model as stipulated by Directive No. 4 of 2024, dated December 31, 2024. This new directive revokes Directive No. 3 of 2021, which had previously appointed Digital Nasional Berhad (DNB) as the sole entity responsible for deploying 5G infrastructure and networks across the country. The decision to adopt a dual network approach followed an extensive evaluation by the Malaysian Communications and Multimedia Commission (MCMC), which assessed various deployment plans and concluded that a more diversified strategy would better enhance the nation’s connectivity goals.

The commission selected U Mobile Sdn Bhd to spearhead the implementation of Malaysia’s second 5G network, a decision that underscores the government’s intention to empower more operators in the rollout of advanced network capabilities. Despite its smaller size compared to other mobile network operators (MNOs), U Mobile has been granted the opportunity to collaborate with larger MNOs, reflecting a cooperative and competitive framework aimed at optimizing the strengths of multiple entities. This move marks a departure from the previous centralized approach and is anticipated to spur innovation and efficiency in the 5G deployment process.

Signed by Minister Fahmi Fadzil, the new directive indicates the ministry’s dedication to advancing 5G infrastructure through a multi-faceted strategy. By leveraging the resources and expertise of various operators, Malaysia aims to create a robust and resilient 5G network that can meet the diverse needs of its population and diverse regions. This development signals an ambitious stride toward enhancing digital connectivity, ensuring that Malaysia remains at the forefront of technological advancements in Southeast Asia.

Explore more

Can Pennsylvania Lead America’s $70B Data Center Race?

Pennsylvania, a state once defined by steel and coal, now stands at the forefront of a technological revolution, vying for dominance in a $70 billion national data center market. Picture vast facilities humming with servers, powering the artificial intelligence (AI) systems that drive modern life—from cloud computing to machine learning. This isn’t happening in Silicon Valley or Northern Virginia, but

Trend Analysis: Payment Diversion Fraud Prevention

In the complex world of property transactions, a staggering statistic reveals the harsh reality faced by UK house buyers: an average loss of £82,000 per victim due to payment diversion fraud (PDF). This alarming figure underscores the urgent need to address a growing menace in the digital and financial landscape, where high-stake dealings like home purchases are prime targets for

How Does Smishing Triad Target 194,000 Malicious Domains?

In an era where a single text message can drain bank accounts, a shadowy cybercrime group known as the Smishing Triad has emerged as a formidable threat, unleashing over 194,000 malicious domains since the start of 2024. This China-linked operation crafts deceptive SMS scams that mimic trusted services like toll authorities and delivery companies, tricking countless individuals into surrendering sensitive

Trend Analysis: Cloud Infrastructure in Cryptocurrency

On a seemingly ordinary day in October, a major outage in Amazon Web Services (AWS) sent shockwaves through the digital world, halting operations for countless industries and exposing a critical vulnerability in the cryptocurrency sector. Major platforms like Coinbase faced significant disruptions, with users unable to access accounts or process transactions during the network congestion crisis. This incident underscored a

LockBit 5.0 Resurgence Signals Evolved Ransomware Threat

Introduction to LockBit’s Latest Challenge In an era where digital security breaches can cripple entire industries overnight, the reemergence of LockBit ransomware with its latest iteration, LockBit 5.0, codenamed “ChuongDong,” stands as a stark reminder of the persistent dangers lurking in cyberspace, especially after a significant disruption by international law enforcement through Operation Cronos in early 2024. This resurgence raises