DeviceAssure News

Building a wall – defending against the “threat” of Huawei devices

Corporate networks take various steps and employ numerous measures to protect themselves from external threats.
Lately, countries too are taking similar steps, in the face of both real and imagined threats. Should they now focus on Huawei devices? What other risks could this introduce? >>

Ghana joins the fight against counterfeit smartphones

The Ghanaian Government has asked its National Communications Authority to work with mobile network operators and other state agencies to investigate the risks associated with the influx of counterfeit smartphones. >>

Why your MDM solution isn’t enough to protect against the risks counterfeits pose

Mobile Device Management (MDM) is an important step in securing your network against rogue devices and unwelcome guests. But is it enough? We looked at some of the most popular solutions and checked if they could identify a fake phone we submitted for inspection.
They did not. >>

Counterfeit Smartphones and Accessories worth over €150,000 seized in Nairobi

Kenya’s Anti-Counterfeit Authority announced in March that they had raided shops in the capital’s Luthuli Avenue after Samsung made complaints to the authority. They followed up with another similar raid in late April.
As well as counterfeit smartphones, accessories such as chargers, replacement batteries, earphones and covers were seized. >>

Google’s Safety Net can’t protect your network like DeviceAssure

Google’s SafetyNet helps protect your app against security threats, including device tampering, bad URLs, potentially harmful apps, and fake users.
But what does it miss, and how can DeviceAssure plug these gaps? >>

Supply chain attacks can introduce yet another vector for a network attack

Prompted by last year’s Bloomberg article on alleged spy chips being implanted in Supermicro servers, Fitzpatrick and Threatpost editor Tara Seals discuss the many layers in the supply chain of computer hardware, and how each layer can introduce risks for network and hardware security. >>

Counterfeit mobile phones are everywhere

Fake handbags, fake watches, fake news—these are all so familiar to us now that we don’t give them a moment’s thought and accept them as a matter of course. So it should come as no surprise to us that counterfeit phones are widespread also. How widespread?

The EU’s Intellectual Property Office (EU IPO) was curious about this also and commissioned a study in 2017 to find out. >>

Even Apple is fooled by counterfeit devices

Apple have been tricked out of almost $1 million worth of iPhones by two Chinese engineering students in Oregon. The scam involved shipping counterfeit iPhones from China to the US.

According to Federal agents, a total of 3,069 iPhone warranty claims were submitted to Apple, with 1,493 replacements being issued >>

Donald Trump joins the fight against counterfeits

Donald Trump has ordered a crackdown on the sale of counterfeit products through third-party online marketplaces and is seeking more information on how to best tackle the growing problem.

Although no specific platform was mentioned, Amazon and Alibaba promptly replied in defence of their operations. >>

EUIPO Report Suggests The Counterfeit Problem Is Increasing

The EU Intellectual Property Office was created in 1994 to oversee trademark and design protection issues across the 28 member states. For 25 years, the office has been busy accepting applications and registrations, as well as looking to protect and enforce rights of citizens and companies across the Union and beyond.

Their latest report highlights their concerns and goes some way to highlighting just how big the issue of counterfeit goods has become. >>

Afilias Launches DeviceAssure℠ to Close Security Gaps from Counterfeit Mobile Devices

Launched today at Mobile World Congress, DeviceAssure is a new solution that uses patent pending technology to address the growing problems caused by counterfeit devices. For the first time, Financial Services providers, Enterprise Security organizations, Governments, App-enabled service providers and others doing business on the web can immediately determine whether a mobile device requesting access is authentic or counterfeit.

Counterfeit mobile devices are often the platform for perpetrating cyber-crime via Malware, Ransomware, Keylogging and Data Theft. >>

Taiwan Police Break Up Chinese-Linked Criminal Ring Selling Fake Apple, Samsung Smartphones

In February, police in Taiwan broke up a criminal counterfeit ring with ties to China that specialized in the sale of fake Apple and Samsung devices.

In total, almost 3,900 items were seized. These ranged from smartphones to accessories such as headphones and chargers. The total value, had the items been genuine, was an estimated 10 million New Taiwan Dollars, around $325,000 USD. >>

U.S. Customs and Border Protection intercept counterfeit iPhones

CBP officers in North Dakota inspected a shipment from Canada which was found to contain 39 counterfeit iPhones, with a recommended retail price of $31,200 USD.

Barbara Hassler, Pembina Area Assistant Port Director – Trade, said: “Our officers and import specialists do an excellent job targeting shipments and identifying counterfeit items. Counterfeit merchandise is often made of inferior materials and can potentially threaten the health and safety of consumers.” >>

Nigerian Communications Commission seeks to eliminate counterfeit mobile devices from the country

In 2018, research showed that over 350 million fake products were sold in Nigeria, and more than half of those were mobile phones. In its report “Combating Counterfeit and Substandard ICT Devices”, the Nigerian Communications Commission’s claimed:

The number of sub-standard devices increased from 140 million as at the end of 2014, to over 350 million by the end of June 2017. >>