Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Super Micro hardware infection
It is shocking to think the hardware and on the phones we buy can be infected by malicious software before a user even uses it. This article does not confirm that there were malicious hardware chips within apple phones but questions if it has happened where which Super Micro states its highly unlikely. To pull this off a hacker would need to have a highly sophisticated plan and would need access to many resources within the company. I’d say an attack like this is possible since many hackers have the time because they have turned their attacks into a business which makes them money. I question why our government allows other countries produce our cellphone and computer devices when we do not truly know what other countries are capable of doing to the device before it is sent to America.
You must be logged in to reply to this topic.