#<p><img class="alignleft size-full wp-image-9231" alt="Rusty chain - Wikimedia Commons" src="http://channeleye.co.uk/wp-content/uploads/2014/10/chains.jpg" width="330" height="220" />The University of Maryland (UMD) said it has created counter measures to prevent the supply chain being targeted by hackers.</p>
<p>A research team at the university’s School of Business said that hackers are targeting vendors and suppliers that have access to enterprises’ IT systems, software and networks. <a href="http://channeleye.co.uk/the-supply-chain-is-the-weakest-it-link/" class="read_more">more&#187;</a></p><div class="feedflare">
<a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:yIl2AUoC8zA"><im g src="http://feeds.feedburner.com/~ff/techeye?d=yIl2AUoC8zA" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:F7zBnMyn0Lo"><im g src="http://feeds.feedburner.com/~ff/techeye?i=8ZNe5GDCr5w:b1D2c7pulTc:F7zBnMyn0Lo" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:V_sGLiPBpWU"><im g src="http://feeds.feedburner.com/~ff/techeye?i=8ZNe5GDCr5w:b1D2c7pulTc:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:gIN9vFwOqvQ"><im g src="http://feeds.feedburner.com/~ff/techeye?i=8ZNe5GDCr5w:b1D2c7pulTc:gIN9vFwOqvQ" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:TzevzKxY174"><im g src="http://feeds.feedburner.com/~ff/techeye?d=TzevzKxY174" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=8ZNe5GDCr5w:b1D2c7pulTc:qj6IDK7rITs"><im g src="http://feeds.feedburner.com/~ff/techeye?d=qj6IDK7rITs" border="0"></img></a>
</div><img src="http://feeds.feedburner.com/~r/techeye/~4/8ZNe5GDCr5w" height="1" width="1"/>

More...