SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: First they come for Foxconn, then they come for you – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > First they come for Foxconn, then they come for you – Computerworld
Software

First they come for Foxconn, then they come for you – Computerworld

News Room
Last updated: May 13, 2026 4:58 pm
News Room
Share
2 Min Read
SHARE

Industrial defenses have improved; so have attacks

In practice, most large industrial facilities are moving to secure their own internal factory networks using technologies such as SD-WAN, private 5G networks, network segregation, isolation of production environments from the corporate network, and active monitoring against threats to factory machinery. All the same, attackers always hope that complex, well-planned combination exploits will find some way into even those most private and secure portions of corporate systems.

What happened at Foxconn

In this particular case, it doesn’t look as if the attack was made against connected industrial equipment at Foxconn. Wired reports a little of the events that took place:

  • The attack was identified on May 1.
  • Foxconn’s network collapsed.
  • Wi-Fi failed first, then the disruption extended to core plant infrastructure.
  • As the attack unfurled, workers were told to switch off their computers.
  • They were also instructed not to log back in under any circumstances.
  • There were previous attacks on other Foxconn facilities and subsidiaries, suggesting regular assaults on the company.

The attackers claim to have stolen key confidential data belonging to Foxconn clients, though sample files published by them don’t seem to include any Apple-related materials.

While it is easy to get lost in the shock value of what seems to be a successful attack against an Apple supplier, the underlying story should be a warning to every company as it highlights the febrile nature of the current threat environment.

Read the full article here

You Might Also Like

Slack’s AI updates signal shift towards agent orchestration – Computerworld

The European Commission eyes rules to restrict US cloud services – Computerworld

IPv6 may briefly have accounted for more than half of internet traffic – Computerworld

Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

Questions raised about how LinkedIn uses the petabytes of data it collects – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

The ‘numbers just aren’t there,’ Dead Space producer says, and that’s why we’ll probably never see Dead Space 4

May 13, 2026
News

Microsoft-Owned Platform Trims Engineering and Product Roles

May 13, 2026
Games

Konami belatedly realises hey, we might have something here, as the first properly new Silent Hill in 13 years sells over 2 million

May 13, 2026
News

Anduril lands $5B as defense giant builds autonomous warship operation in Seattle – GeekWire

May 13, 2026
Games

The Talos Principle 3 promises an ‘epic grand finale’ to the tale of humanity’s rebirth

May 13, 2026
Games

This city-smashing monster sim is the first game I’ve ever played where my reward for beating a level is getting a nuke dropped on my head

May 13, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?