Connect with us
Counterfeit chips are increasingly being identified in supply chains Counterfeit chips are increasingly being identified in supply chains

Security

Counterfeit chips are increasingly being identified in supply chains

Published

on

Many manufacturers are faced with the supply of counterfeit, substandard or used microcircuits.

Fighting the unprecedented global chip crisis, more and more electronics manufacturers are turning to third-party supply chains to meet demand. Many manufacturers are faced with the supply of counterfeit, substandard or used microcircuits.

According to Nikkei Asia, Japanese electronics manufacturer Jenesis was one of the hardest hit. Since the company could not purchase microcomputers from conventional sources, it placed an order through the website of the Chinese e-commerce giant Alibaba. Unfortunately, the chips that arrived did not turn on and were completely different from those ordered by Jenesis. Jenesis representatives were unable to contact the supplier following this incident.

This trend should be a warning to electronics manufacturers looking to buy chips. Manufacturers and authorized distributors keep records of chips sold by third parties, but no manufacturer guarantees these chips. In most cases, it is unclear how and where vendors store the chips. These situations make it easier for suspicious goods to enter supply chains, but it is difficult to trace the true source.

These can be chips taken from discarded equipment or recycled chips that do not meet quality standards, including chips with a forged manufacturer name or model number.

As of August, experts from Oki Electric Industry, a company specializing in the provision of chip validation services, said they had received about 150 requests for chip analysis. Many of them were from manufacturers of industrial and medical equipment. According to the results of 70 checks, it turned out that about 30% of the microcircuits were faulty.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Hacker Hacked Fast Company’s Apple News Account and Spread Racist Messages

Published

on

Hacker Hacked Fast Companys Apple News Account and Spread Racist

An unknown hacker was able to access the business publication Fast Company’s Apple News account and sent out a series of obscene and racist messages via push notifications. Subscribers are the victims.

Hacker Hacked Fast Company's Apple News Account and Spread Racist Messages

Fast Company confirmed the hack, and so did Apple. The incident is currently under investigation.

Fast Company’s Apple News account was hacked Tuesday night. After that, two push notifications with obscene and racist content were sent with a minute interval. The messages are disgusting and do not match Fast Company content. We are investigating the incident and have also paused feed updates and closed FastCompany.com until we are confident the situation has been resolved.“, – noted in the publication.

Shortly before the shutdown, the hacker himself posted an entire article on the Fast Company website, where he described in detail how he managed to bypass the protection. It turned out that the accounts on the site were protected by the same password, this also applies to the account of the site administrator. Having gained access to them, the hacker was able to get to the authentication tokens and log in to Apple News.

At the same time, in addition to hooliganism, no financial losses or manipulations were recorded.

Continue Reading

Security

Young hacker who leaked GTA 6 material denies his guilt

Published

on

Young hacker who leaked GTA 6 material denies his guilt

The 17-year-old hacker, who was previously arrested in the UK on suspicion of hacking Rockstar Games and Uber, has pleaded not guilty. According to police, he appeared in court over the weekend, but refused to plead guilty to PC misuse. At the same time, he admitted that he violated the conditions of release on bail. Now he is being held in a juvenile detention center.

Young hacker who leaked GTA 6 material denies his guilt

According to investigators, the 17-year-old is part of the Lapsus$ hacker group and is behind the recent leak of videos and other details of the $2 billion GTA 6 game.

Earlier, a hacker under the nickname teapotuberhacker published an archive with video and source code from an early version of GTA 6, which has already gone viral. Take-Two tried to stop the spread of the leak, but it was only partially successful.

The hacker also said that it was he who attacked the Uber computer system, gaining access to correspondence, email addresses, and so on.

At the moment, the investigation is ongoing, so it is not yet clear how this story will end.

Continue Reading

Security

Cloudflare introduces world’s first eSIM with better security than VPN

Published

on

Cloudflare introduces worlds first eSIM with better security than VPN

Cloudflare has introduced a new solution that may be suitable for smartphone and mobile Internet users. We are talking about an eSIM card called Zero Trust SIM. Its peculiarity is that it provides an increased level of security, reducing the risk of number substitution.

Cloudflare introduces world's first eSIM with better security than VPN

In technical terms, we are talking about the transfer of DNS requests through the Cloudflare gateway, which allows you to protect them from interception and spoofing. Also promised is a check of all intermediate nodes through which the device accesses the Internet.

According to Cloudflare CTO John Graham-Cumming, Zero Trust SIM technology can outperform VPNs and other security systems as it provides cell-level protection.

Zero Trust SIM will launch first in the US, where only a virtual card for iOS and Android will be available at first. When activated, it will bind to a specific device and allow you to protect it. Physical maps are also expected in the future.

The company is also launching Zero Trust for Mobile Operators, an affiliate program for telecom operators that will enable them to offer subscriptions to the services and tools of the Zero Trust platform. In addition, a similar project is expected for the Internet of Things.

Continue Reading

Most Popular