Archive for the ‘supply chain’ Category

Touchscreens ‘at risk from chip in the middle attack’, warn researchers

August 25th, 2017

Researchers call for manufacturers to recognize that compromised hardware is a real possibility

Posted in chip-in-the-middle attack, hardware threats, Mobile, supply chain | Comments (0)

Five Billion Tests Later: IoT and Industrial Control System Protocols Raise Alarms

August 9th, 2017

In-brief: Close to five billion “fuzzing” tests conducted during 2016 reveal protocols used by industrial control systems, vehicles and Internet of Things devices to be weaker, on average, with many crashing hundreds of times and revealing vulnerabilities that could be used by malicious actors.  A study of 4.8 billion automated…

Read the whole entry… »

Related Stories

Posted in connected devices, critical infrastructure, fuzzing, Internet of things, protocol, published research, Reports, software, software development, supply chain, survey, Top Stories, trends, vulnerabilities | Comments (0)

Flaw In D-Link Software Affects 400K Devices

July 8th, 2016

In-brief: A vulnerability in software by device maker D-Link is much more widespread than initially believed, affecting hundreds of thousands of Internet connected devices, including cameras, home routers, wireless access points and network attached storage. A vulnerability in software by device maker D-Link is much more widespread than initially believed, affecting hundreds of thousands of Internet connected devices, including cameras, home routers, wireless access points and network attached storage. The security firm Senrio said on Thursday that a vulnerability it first disclosed in June in D-Link’s DCS-930L Network Cloud Camera also affects “a huge range of products” made by that company. More than 120 models across Connected Home Products, including cameras, routers, access points, modems, and storage, are affected by this single vulnerability, Senrio said in a statement. As many as 400,000 D-Link devices that are accessible from the public Internet are vulnerable to remote attack as a result of the remote code […]


Definitive Guide to DLP

Posted in broadband router, cameras, critical infrastructure, customer premises equipment (CPE), d-link, embedded device, hardware, home gateway, Internet of things, NAS, Patching, router, Senrio (Xipiter), supply chain, Switch, system on chip, trends, vulnerabilities | Comments (0)