Blog Posts Tagged with "Stuxnet"

Bd623fa766512fdf6b57db66f522b741

Stuxnet: Tsunami of Stupid or Evil Genius?

June 01, 2012 Added by:Ali-Reza Anghaie

We just compounded ugly. Weaponizing Cyberspace is a losing proposition across the board but it's still going to happen. I was just hoping we'd cut it a bit short and realize the errors - this NYT piece makes me feel like we don't have enough depth in DC to realize the risks before it's too late...

Comments  (7)

69dafe8b58066478aea48f3d0f384820

Cyberwar Threats and Critical Infrastructure Vulnerabilities

May 31, 2012 Added by:Headlines

"Targeted attacks are increasing dramatically. It could be state sponsored or it could be just hacktivists or it could be a cyber criminal organisation. But we know the number one target is government institutions and the second is manufacturing, including oil and gas..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame Malware: From Genesis to the Conspiracy Theory

May 31, 2012 Added by:Pierluigi Paganini

Some antivirus providers were ready with a fix for Flame. This information, together with evidence that the malware dates to at least 2010, would lead me to believe that the major security companies were aware of Flame and have been silent because of agreements with Western governments...

Comments  (2)

Aadb52f9100e0d31264fb3ce9e3d2536

Flame: Implications vs. Speculation

May 30, 2012 Added by:Robert M. Lee

Attribution is incredibly hard to apply in the cyber domain, and even the most appealing pieces of evidence can be purposely misleading. The perception of attribution applied to a nation-state cyber attack can put tension on nation-state relationships, have an effect on deterrence, and cause real-world issues...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Flame Analysis: A Sophisticated and Discreet Threat

May 30, 2012 Added by:Headlines

"The modular nature of this malware suggests that a group of developers have created it with the goal of maintaining the project over a long period of time; very likely along with a different set of individuals using the malware. The architecture... allows the authors to change functionality and behavior"...

Comments  (0)

296634767383f056e82787fcb3b94864

Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Flame: Another Holiday, Another Super Virus

May 29, 2012 Added by:Kevin McAleavey

Flame is huge - 20 modules and 20 megabytes. Strange that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years. The worm runs as a Windows service, and most of the files are visible, making this even more of a surprise...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Former DHS Director Sean Paul McGurk Joins ICS ISAC

May 22, 2012 Added by:Headlines

Malware such as Stuxnet and Duqu have led to the recognition of broader systemic vulnerabilities within critical infrastructure which until recently have been largely disconnected. Addressing the resiliency of these systems must occur at technical, organizational and policy levels...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Kaspersky Warns of Critical Infrastructure Vulnerabilities

May 18, 2012 Added by:Headlines

“It’s not possible to protect. Stuxnet told us that modern systems are not protected... SCADA could be very easy victims – the result of an attack could be like Stuxnet but everywhere... [We] need to understand the danger of cyber-weapons and of cyber-war to ruin national infrastructure..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Testimony: Iran Preparing Attacks on U.S. Infrastructure

April 26, 2012 Added by:Headlines

Cybersecurity experts will testify before Congress today on the high probability that the Iranian government is engaged in building a cyber offensive force geared towards attacks against critical U.S. infrastructure targets including power and water distribution facilities...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Iranian Double Agents Planted Stuxnet in Nuclear Facilities

April 17, 2012 Added by:Dan Dieterle

“Using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. 'Iranian double agents' would have helped to target the most vulnerable spots in the system...”

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Second Annual Cyber Security Summit (Prague) Write-up

April 15, 2012 Added by:Robert M. Lee

An important aspect of the conference was the ability to network with people from a wide variety of sectors. Establishing new connections, sources of information, and building friendships opens up avenues for much needed information sharing. Emphasis must be placed on education...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Ten Takeaways from the Tilded Platform

April 02, 2012 Added by:Robert M. Lee

Stuxnet had a major impact on ICS/SCADA. It revealed vulnerabilities that many cyber security experts in that community had been warning about for years. Moreover, it showed that nation-states are willing to target these systems if it helps the success of a mission...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies New Duqu Trojan Driver Variant

March 20, 2012 Added by:Headlines

Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »