Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Supply Chain Uncertainties Complicate Security
Threaded  |  Newest First  |  Oldest First
SgS125
50%
50%
SgS125,
User Rank: Ninja
1/24/2013 | 7:24:46 PM
re: Supply Chain Uncertainties Complicate Security
No kidding, we really don't think we can just look at the traffic and determine if it is normal?-
lancop
50%
50%
lancop,
User Rank: Moderator
1/27/2013 | 7:02:09 PM
re: Supply Chain Uncertainties Complicate Security
I'm surprised that there aren't more reader comments posted here. Considering how much industrial espionnage & other hacking comes out of China, and how much the Chinese government monitors internet traffic within China, it is highly improbable that-the sources of that-industrial espionnage are not known to Chinese authorities. So, we must deduce that they operate with at least the tacit permission of the government, if not with active assistance & encouragement. Given the escalation of attack sophistication, which implies very professional & well-funded teams of specialists at work every day, it is logical for the highest security enterprises to look at their network infrastructure devices with a heightened sense of skepticism since they are the likely next frontier of targeted exploits. This is the essential flaw in "The Information Age" - private knowledge is-power only if it remains a secret, and secrets are impossible to maintain for long-in an internet-connected world. Therefore, real power comes from ownership of the means of production - The Supply Chain itself, since it makes money by making & selling "actual things" regardless of who claims ownership of the intellectual property behind those things. By the time IP ownership claims percolate thru the global trade & legal systems, manufacturers may already be leveraging newly stolen IP into new products using new company names. In this game of cat & mouse, it is "advantage cat" every time...


News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18194
PUBLISHED: 2021-05-17
Cross Site Scripting (XSS) in emlog v6.0.0 allows remote attackers to execute arbitrary code by adding a crafted script as a link to a new blog post.
CVE-2020-18195
PUBLISHED: 2021-05-17
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component " /admin.php?action=page."
CVE-2020-18198
PUBLISHED: 2021-05-17
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete specific images via the component " /admin.php?action=images."
CVE-2020-21831
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637.
CVE-2020-21842
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051.