Uncategorized

Hacked: A Hong Kong Story

Because the BMC has unrestricted control of the buses between chips and full privileges, there is little that can not be be dome.

Navigation menu

Its more likely they are activated out of band such as a magic string to the BMC Ethernet interface which assumes that you have access to the management network. Realistically this would require inside contact as these networks are tightly controlled and restricted to minimum users.

This is possible given that hardware implant has been done already and further implants may be possible. These servers still need to exfiltrate data — outbound session would be required.

(17 Videos)

If you control the outbound traffic via a proxy it could be prevented. Supply-chain security is an insurmountably hard problem. Our IT industry is inexorably international, and anyone involved in the process can subvert the security of the end product. No one wants to even think about a US-only anything; prices would multiply many times over.

As Bloombergs highlights, a substantial amount of internal work is done in Mandarin because thats where the work is done. Political tensions including the trade disputes make this a fraught issue to engage with. However, the publishing of this story at this specific time is worth considering in the light of political tensions. It could be a smear campaign by US agencies to promote a political agenda.

We have no comment from US spy agencies yet but have a record of compromising the supply chain as we saw with Cisco routers when Snowden released documents. We cannot trust anyone, yet we have no choice but to trust everyone. No one is ready for the costs that solving this would entail. Most silicon comes from the US or Taiwan, some from Japan. Assembly and packaging is almost exclusively done in China where labour and factories are available and cheap.

Apple will prevent the use of OEM repair components in latest generation of MacBooks and could be a response to supply chain vulnerabilities. A new module requires a program to validate the components.

VTech hack: US and Hong Kong to investigate as 6.4m children exposed

It's the latest embarrassing data breach to hit a major international airline. British Airways said last month that hackers stole the payment card details of , of its customers. The hackers who hit Cathay gained access to 27 credit card numbers but without the cards' security codes, and another expired credit card numbers, according to the airline.

It said it has "no evidence that any personal data has been misused," adding that "no passwords were compromised. Cathay said it first discovered "suspicious activity" on its network in March and "took immediate action to contain the event" and investigate it with the help of a cybersecurity firm.

It confirmed in May that personal data had been compromised and has since been analyzing the data to identify which passengers were affected. The company has notified police in Hong Kong. It has also set up a dedicated website, infosecurity. The airline said the combination of data accessed by the hackers varied from passenger to passenger. It included roughly , passport numbers and , Hong Kong identity card numbers. Cathay was ranked as the sixth best airline in the world this year by Skytrax, a London-based firm that provides advisory services for carriers and airports.

Altogether, details on hundreds of mechanical and software systems were compromised - a significant breach in a critical area of warfare that China has identified as a priority, both for building its own capabilities and challenging those of the United States.

Ancient Aliens: Hacking NASA Secrets (Season 12, Episode 9) - History

Stavridis had no independent knowledge of the breach. The Sea Dragon project is an initiative of a special Pentagon office stood up in to adapt existing U. The Defense Department, citing classification levels, has released little information about Sea Dragon other than to say that it will introduce a "disruptive offensive capability" by "integrating an existing weapon system with an existing Navy platform.

VTech hack: US and Hong Kong to investigate as m children exposed | Technology | The Guardian

Military experts fear that China has developed capabilities that could complicate the Navy's ability to defend U. The Chinese are investing in a range of platforms, including quieter submarines armed with increasingly sophisticated weapons and new sensors, Adm. Philip Davidson said during his April nomination hearing to lead U.


  • Quotations by Bruce Lee.
  • Cathay Pacific hack: Data breach hits millions of passengers - CNN.
  • ENA and MAKOTO 1 Case:Jessica 3on3 Publishing Series (Japanese Edition).
  • Le syndrome de Sherlock Holmes (French Edition)?

And what they cannot develop on their own, they steal - often through cyberspace, he said. In recent years, the United States has been scrambling to develop new weapons or systems that can counter a Chinese naval buildup that has targeted perceived weaknesses in the U. Key to the American advantage in any faceoff with China on the high seas in Asia will be its submarine fleet. China has made closing the gap in undersea warfare one of its three top military priorities, and although the United States still leads the field, China is making a concerted effort to diminish U.

But the rapid modernization and buildup of the Chinese navy in recent years, as well as Russia's resurgent forces at sea, have prompted the Pentagon to renew heavy investment in technologies to sink enemy warships. The introduction of a supersonic anti-ship missile on U. Navy submarines would make it more difficult for Chinese warships to maneuver.