Blog Posts Tagged with "Stuxnet"

03b2ceb73723f8b53cd533e4fba898ee

Iran, the Cyber Threat... Are We Creating A New Enemy?

January 02, 2012 Added by:Plagiarist Paganini

But are we sure that this is true? No one doubts Iran's capabilities, but there is no doubt that their means and financial resources are nothing compared to those of the U.S., China, Israel and Russia. Although we are faced with a Nation that has fully understood the importance of a cyber strategy, we cannot certainly consider it more offensive than others...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

The Next Cyber Weapon: Hypothesis on Stuxnet Three

December 28, 2011 Added by:Plagiarist Paganini

These are works in progress and they will be improved with components developed to attack strategic targets. Which are the features that we believe may be present in future versions of these dreaded malware? Asking yourself this question is crucial to guide research...

Comments  (0)

296634767383f056e82787fcb3b94864

Why I Oppose the Twelve Chinese Hacker Groups Claim

December 21, 2011 Added by:Jeffrey Carr

Senators and Congressmen don't have enough knowledge about cybersecurity to discern truth from fiction, so what starts off as questionable analysis soon becomes terrible government policies, especially when it is advocating for civilian companies to counterattack a nation's network...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

ENISA Report on Maritime Cyber Security

December 20, 2011 Added by:Stefano Mele

Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Invests Heavily in Developing Cyberwarfare Capabilities

December 19, 2011 Added by:Headlines

The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Biggest Security Events of 2011

December 16, 2011 Added by:Headlines

"Sony went out of its way to keep customers in the dark for the majority of the outage and when it did address the issue, it presented misinformation and blamed everyone but itself..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Duqu Analysis Shows ICS-SCADA Networks Vulnerable

December 15, 2011 Added by:Headlines

"Critical infrastructures are still not sufficiently prepared for attacks like DuQu... There are no commonly adopted ICS security standards, guidelines or regulations, corporate management is not sufficiently involved, and there are numerous technical vulnerabilities..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Iranian Ambassador Discusses Cyber Attacks on US Targets

December 14, 2011 Added by:Infosec Island Admin

Iranian Ambassador Mohammad Hassan Ghadiri discusses the potential for state sponsored attacks on the White House, FBI, CIA, and nuclear power plant systems within the US. The video shows the ambassador talking also asking about how to further the attacks by making certain contacts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ICS-SCADA Security Concerns Spur Increased Funding

December 12, 2011 Added by:Headlines

“Many SCADA systems were deployed without security in the belief that SCADA would always be isolated from the Internet. But it’s not, and even when it is, attacks such as Stuxnet can circumvent the isolation by using USB memory sticks to spread..."

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

The Control Systems Community and Cyber Warfare

December 11, 2011 Added by:Robert M. Lee

Cyber warfare took place long before the release of Stuxnet, but its release caused the world to realize the benefits of using a domain of warfare with limited entry costs and the possibility of non-attribution, which is the ability to operate without positively being connected to an operation...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Photo Shows Stuxnet as Perfect Match to Iranian Network

December 09, 2011 Added by:Headlines

"When viewed closely, the photo reveals green dots distributed in columns of increasing length. Each column contains four dots that represent uranium centrifuges. Multiplying these together produces a cascade structure sequence identical to that in Stuxnet..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher Traces Stuxnet/Duqu Timeline Back to 2006

December 02, 2011 Added by:Headlines

"May 2006 - Engineers compile code for a component of Stuxnet that will allow them to attack programmable logic controllers, or PLCs, manufactured by Siemens of Germany. Iran's nuclear program uses Siemens PLCs to control the gas centrifuges in its uranium enrichment facilities..."

Comments  (3)

B64e021126c832bb29ec9fa988155eaf

Duqu Servers Included Hacked Linux Systems

December 01, 2011 Added by:Dan Dieterle

Be it brute force password hacking or another Stuxnet 0-Day, Duqu shows that Linux is vulnerable to hackers. With a growing install base, supplanting Windows in many facilities, expect it to become even more of a target...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: Analyzing a Stuxnet Memory Dump

November 29, 2011 Added by:Dan Dieterle

Take a look at a memory dump from a system with Stuxnet - this code has execute and read write permissions. We could go on and find Stuxnet registry key settings, hidden Dll’s, file objects and numerous other artifacts in this memory sample all with using Volatility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Cyber-Jihadi Cells Plot Western Destruction

November 28, 2011 Added by:Headlines

"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Getting Smacked in the Face Over TCP

November 21, 2011 Added by:Robin Jackson

Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »