Not worried at all.
Probably neither Windows nor Apple nor Linux.
Manufacturing and Production automation relies totally on real time OSes. And these processes are networked together under SCADA networks ("Supervisory control and Data Acquisition".)
On an aside the term "computer virus" is applied on the post under generic terms.
My guess from past SCADA attacks, and more likely than not: a very specialized computer worm, that self-replicated across the SCADA network.
I would be. TSMC was not the only Fab to be hit. Global Foundries was also hit Friday and is still recovering. A little Corporate Cyber attack perhaps? More likely Eastern Europe. Samsung Austin seems to have been spared. I can see where they would have better security than Global Foundries(anyone does), but TSMC should be on par. Very concerning.![]()
There is a reason Windows OS is dominant in control systems and manufacturing -- Apple under Steve Jobs sold Apple Basic to Microsoft for $5. Yes, he actually cut that deal with Bill Gates in 1985 to get Excel and Word on the Mac. Apple Basic was far more advanced than anything MS had at the time and eventually became Visual Basic. The rest is history.Yikes. Surprising, but not surprising. Evidently TSMC uses PCs (not Macs) -- which is probably true in nearly all manufacturing.
Wait and see what effects come from this. I read elsewhere TMSC has been making the A12 CPU for quite a while at this point - so Apple should already have a bunch of the CPU's on hand for the new iPhones.
Well well well. "...an "unidentified vendor" provided the company with the infected tool..." So is the vendor compromised? This is quite a scheme.These SCADA networks need to be better protected. I've seen so many that are simply routeable subnets from the internal subnets.
Article states it was from "misoperation" during software installation. How can you attribute this to a competitor doing something?
I'm guessing it's the vendor who manufactuers and/or supports the fabrication hosts, not a competitor (assuming that's what you're referring to in my post).Well well well. "...an "unidentified vendor" provided the company with the infected tool..." So is the vendor compromised? This is quite a scheme.
Infecting (somehow) a "trusted" vendor would be the vector of choice to hit the fab network. As to who in the world would want to do this, I can't say.I'm guessing it's the vendor who manufactuers and/or supports the fabrication hosts, not a competitor (assuming that's what you're referring to in my post).
The iPhone notch is too wide, a top chin would look a lot better. What's next ... zig zags?
Shipments from TMSC will now be delayed by one day.