Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Supply Chain Uncertainties Complicate Security
Newest First  |  Oldest First  |  Threaded View
lancop
50%
50%
lancop,
User Rank: Moderator
1/27/2013 | 7:02:09 PM
re: Supply Chain Uncertainties Complicate Security
I'm surprised that there aren't more reader comments posted here. Considering how much industrial espionnage & other hacking comes out of China, and how much the Chinese government monitors internet traffic within China, it is highly improbable that-the sources of that-industrial espionnage are not known to Chinese authorities. So, we must deduce that they operate with at least the tacit permission of the government, if not with active assistance & encouragement. Given the escalation of attack sophistication, which implies very professional & well-funded teams of specialists at work every day, it is logical for the highest security enterprises to look at their network infrastructure devices with a heightened sense of skepticism since they are the likely next frontier of targeted exploits. This is the essential flaw in "The Information Age" - private knowledge is-power only if it remains a secret, and secrets are impossible to maintain for long-in an internet-connected world. Therefore, real power comes from ownership of the means of production - The Supply Chain itself, since it makes money by making & selling "actual things" regardless of who claims ownership of the intellectual property behind those things. By the time IP ownership claims percolate thru the global trade & legal systems, manufacturers may already be leveraging newly stolen IP into new products using new company names. In this game of cat & mouse, it is "advantage cat" every time...
SgS125
50%
50%
SgS125,
User Rank: Ninja
1/24/2013 | 7:24:46 PM
re: Supply Chain Uncertainties Complicate Security
No kidding, we really don't think we can just look at the traffic and determine if it is normal?-


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.