BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Beware of Third-Party Accessories

The Dangers of Purchasing Third-Party Computer Accessories

Think all computer accessories and cables are safe? Think again! Learn how your next accessory purchase could expose your organization to hackers and threats.  

Changing Cables

Buying third-party accessories for computing devices can save money, but what if those purchases ended up being the cause of a cybersecurity attack and the exposure of your company’s sensitive data? New third-party charging cables that have come on the market could be your next data breach culprit if you’re not careful. According to a blog post written by NewQuest IT Solutions, modified versions of Apple’s Lightning cables could be used to gain unauthorized access to your organization’s devices. A hacker can use the wireless implant embedded in the cable to commit an intrusion simply by typing in the cable’s IP address.

How It Works

Since the third-party cable cannot be identified as counterfeit with the naked eye, it is easy for many to be fooled into believing it is legitimate. When you plug in the cable to charge or sync a device, a hacker can now access all the information on that device. The wireless implant inside the cable sends out signals equivalent to a Wi-Fi hotspot. By typing in the cable’s IP address, the hacker is able to pull up data from the device, install malware, send scripts and other commands. The hacker can accomplish all of this as long as he or she is within 300 ft of the cable’s wireless signal.

Devices at Risk

Any device that uses a third-party charging cable or accessory is at risk. That risk increases if multiple third-party accessories are plugged in or the supplier of the accessories could be considered suspect. Although the example highlighted by NewQuest IT Solutions is applicable to Apple devices, there are enough third-party cables and accessories for Windows-based devices that can make them far from risk-adverse. Smartphones, computers, tablets and older devices like the iPod that sync are all vulnerable.

What to Look For

To avoid buying counterfeit accessories and cables, double-check the packaging, the accessory and the supplier. Only purchase third-party accessories that are labeled as certified. Another way to avoid a potential cybersecurity threat is to only purchase from trusted and verified suppliers. Finally, consider switching to OEM versions whenever possible. Although the initial or per unit cost might be higher, it could save you and your organization a more expensive headache in the long run.

More Like This

AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus

Original release date: December 2, 2021 Summary This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise framework for referenced threat actor techniques and for mitigations. This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI) and …

AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus Read More »

Read More

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration Competing Social Software Giants Offer Customer-Requested Consolidation of the Two Applications’ Best Features Workplace stated in May 2021 that it has reached a milestone of 7 million paying members. Microsoft similarly revealed later that July that its Teams platform had 250 million unique …

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration Read More »

Read More

AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

Original release date: November 17, 2021 Summary Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement multi-factor authentication. • Use strong, unique passwords. Note: this advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, …

AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities Read More »

Read More

How to Pick the Ideal Unified Endpoint Management Platform

Picking the Ideal Unified Endpoint Management Platform Unified endpoint management (UEM) software plays an important role in today’s business world, thanks to significant technological advancements. Over the years, endpoint devices have become more data-intensive, connected, and ubiquitous, despite the security risks associated with the software. Thus, proper management of the devices is a top priority …

How to Pick the Ideal Unified Endpoint Management Platform Read More »

Read More

Windows 11 Tips: How to Get Things Done More Effectively

Windows 11 Tips: How to Get Things Done More Effectively Windows 11 comes with a slick redesign and a comprehensive selection of new features. Although it shares many similarities with Windows 10, the new OS introduces groundbreaking features like Android app integration. The best part is that the operating system brings balance to your personal …

Windows 11 Tips: How to Get Things Done More Effectively Read More »

Read More

A Quintessential Guide to Windows 11 Tips and News

A Quintessential Guide to Windows 11 Tips and News Windows 11 introduces a wide selection of interesting new features capable of transforming the user experience. In addition, the operating system comes with a streamlined design, Android apps integration capabilities, a built-in Microsoft Teams conferencing application, and other notable features. Examples of features that you can …

A Quintessential Guide to Windows 11 Tips and News Read More »

Read More