iTnews
  • Home
  • News
  • Technology
  • Hardware

Tainted electronics imports pose security threat

By Jim Finkle on Jul 12, 2011 6:54AM
Tainted electronics imports pose security threat

Supply chain used to launch attacks.

The United States needs to be more wary of computers and other electronics imports that could be laden with malicious software, according to a leading Congressional expert on cyber security.

Hackers are injecting bad codes into components at overseas manufacturing plants, planting tools to help them launch cyber attacks on the United States, Rep. Jim Langevin told Reuters after speaking at a cyber security event in Rhode Island.

He said the problem affects consumer electronics as well as corporate technology systems, which can hold secret corporate and government data.

"Corrupting hardware and software is embedded in the supply chain," he said. "We have a real challenge on our hands to better secure the supply chain."

Tainted supply chain components are a growing threat to the United States, particularly in military operations, said Doug White, a cyber security expert and professor at Roger Williams University.

"It's not something that a lot of people have thought about in the past. They should have thought about it," he said.

"What if you went on a battlefield and hit a button and everything stopped working? It's pretty scary stuff," White added.

Langevin and White spoke at a news conference in Providence on a new state program to combat cyber threats, the Rhode Island Cyber Disruption team.

Langevin sits on the US House of Representatives committees on Armed Services and Intelligence and is privy to information about cyber threats that the government has not publicly disclosed.

He is sponsor of the Executive Cyberspace Coordination Act of 2011, one of the most closely watched cyber security bills in Congress. The areas it addresses include providing US government assistance to utilities and other companies that manage key US infrastructure projects.

Embedded malware is just one of many challenges that the US government and businesses face in fighting cyber attacks, said Alan White, director of security and risk consulting for Dell's SecureWorks computer security division.

"The public and private sector is constantly attacked by hackers," he said.

(Reporting by Jim Finkle; Editing by Richard Chang)

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
electronicsembeddedhardwareimportedmalwaremilitarysecuritytaintedthreat

Partner Content

The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Jim Finkle
Jul 12 2011
6:54AM
0 Comments

Related Articles

  • VMware, F5, Log4j added to EnemyBot attack targets
  • Apple's Tim Cook says 'threat profile' of iPhone justifies App Store rules
  • RBA pushes first IaaS workload into Azure
  • Google adds phishing protection to Workspace apps
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

ADHA extends Accenture's My Health Record support deal for $100m

ADHA extends Accenture's My Health Record support deal for $100m

Digital Nation

Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.