Tag Archive for: supply

Someone Is Slipping Malware Into Android Devices in the Supply Chain – The Mac Observer (blog)


The Mac Observer (blog)

Someone Is Slipping Malware Into Android Devices in the Supply Chain
The Mac Observer (blog)
Get this: someone is slipping malware into Android devices while they're still in the supply chain. Security firm Check Point found evidence that malware, adnets, spyware, and even ransomware was installed on some 36 Android devices before customers …
Preinstalled Malware Targeting Mobile Users | Check Point BlogCheck Point Blog
Google Play Apps Infected with Malicious IFrames – Palo Alto Networks BlogPalo Alto Networks Blog
Mobile Malware: Secure iOS, Android and Windows Smartphones with Sophos Mobile ControlSophos
KETV Omaha –Sixgill
all 94 news articles »

android ransomware – read more

Cyber Supply Chain Security Is Increasingly Difficult for Critical Infrastructure Organizations

As the old cybersecurity adage states, ‘the cybersecurity chain is only as strong as its weakest link.’  Smart CISOs also understand that the proverbial weak link may actually be out of their control. 

U.S. retailer Target certainly experienced this lack of cybersecurity control in 2013.  The now infamous Target data breach that exposed the personal information of 110 million people began with a spear phishing attack on one of the company’s HVAC contractors, Fazio Mechanical of Sharpsburg, PA.  Cyber-criminals compromised a Fazio Mechanical system, gained credentialed access to Target, and proceeded to wreak havoc on Target’s data, customers, and reputation.

To read this article in full or to leave a comment, please click here

Network World Security

Microsoft shares 2 cybersecurity papers to protect infrastructure and supply chain

And they say crime doesn’t pay…did you know cybercrime kingpins recruit new employees with incentives like a Ferrari and glamorous female assistants? This might be a good time to review if your company has the best safeguards in place. 
Ms. Smith’s blog

Tor calls for help as its supply of bridges falters

Just like the US highway infrastructure, Tor needs new bridges. The encrypted anonymizing “darknet” that allows activists, journalists, and others to access the Internet without fear of censorship or monitoring—and which has also become a favored technology of underground groups like child pornographers—is having increasing difficulty serving its users in countries that have blocked access to Tor’s entry points. Tor bridges are computers that act as hidden gateways to Tor’s darknet of relays. After campaigning successfully last year to get more volunteers to run obfuscated Tor bridges to support users in Iran trying to evade state monitoring, the network has lost most of those bridges, according to a message to the Tor relays mailing list by Tor volunteer George Kadiankakis.

“Most of those bridges are down, and fresh ones are needed more than ever,” Kadiankakis wrote in an e-mail, “since obfuscated bridges are the only way for people to access Tor in some areas of the world (like China, Iran, and Syria).” Obfuscated bridges allow users to connect to the Tor network without using one of the network’s known public bridges or relays as an initial entry point.

Obfuscated bridges have become a necessity for Tor users in countries with networks guarded by various forms of deep packet inspection technology, where censors have put in place filters that spot traffic matching the signature of a Tor-protected connection. Some of these censors use a blocking list for traffic to known Tor bridges. To circumvent detection, Tor users can use a plugin called a “pluggable transport” to connect to an obfuscated bridge and mask their network signature.

Read 4 remaining paragraphs | Comments


Ars Technica » Technology Lab