If an update from a cybersecurity firm tasked to protect Windows computers can cause global disruption, how vulnerable is a connected world to a concerted malicious attack?
When attempting to sabotage a VVIP’s car, one approach is to directly tamper with the specific car, such as cutting its brake lines. However, due to extensive security measures, this would be challenging.
A more insidious method would be to target the supplier of the brake pads used by the VVIP’s entire convoy. By introducing faulty brake pads into the supply chain, all the cars in the convoy could be compromised with a single action. This strategy allows for a broader impact with a hidden, yet highly effective, attack.
Now, think of your computer as similar to the VVIP’s car. If a hacker wants to attack your computer, they could attempt a direct assault on the machine itself. Alternatively, they could implant malware into various components used to build the software your computer relies on. These components might include software for mathematical calculations, graphics processing, or cybersecurity, each developed by different vendors. By compromising these components, an attacker could indirectly undermine the entire system.
Read full story at TOI+
Disclaimer
Views expressed above are the author’s own.
END OF ARTICLE