Blog Posts Tagged with "Stuxnet"

F5a99fda189e83ed3f4ce79415910cee

From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Symantec Uncovers Earliest Known Version of Stuxnet (Version 0.5)

February 26, 2013 Added by:Mike Lennon

According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

How the US is Preparing for Cyber Warfare

January 29, 2013 Added by:Pierluigi Paganini

The US and Israel are considered in cyber warfare context to be the most advanced nations, and according the international press they have been been involved in the creation of the first worldwide recognized cyber weapon, Stuxnet, and many other related spy tools kits such as Flame...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Securing Smart Grid, SCADA, and Other Industrial Control Systems

October 11, 2012 Added by:Ben Rothke

The Stuxnet computer worm of mid-2010 was a huge wake-up call for the energy industry. It also catapulted SCADA from an obscure term to the forefront of industrial security. But nearly two years later, it is unclear if the energy sector is adequately prepared for sophisticated information security threats...

Comments  (2)

E595c1d49bf4a26f8e14ce59812af80e

Secure Communications in Harsh Environments

October 02, 2012 Added by:Patrick Oliver Graf

For a long time, hackers only targeted the IT systems of offices or individuals. This, however, has changed as the bad guys more frequently go after unconventional targets, like industrial and oil plants, refineries of all kinds, power grids or water utilities...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Energy Sector Cyber Espionage: Chinese Hackers are not Alone

September 29, 2012 Added by:Pierluigi Paganini

Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Three Days of The Condor... With Malware

September 07, 2012 Added by:Infosec Island Admin

Pandora’s box has been opened. All the players are taking the field, and many of them may not be ready to play a proper game… Shamoon did it’s thing, but it seems to be more a brute force tool than an elegant piece of code and a slick plan. The blowback though is yet to be determined...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is an International Cyber Regulatory Agency Needed?

August 30, 2012 Added by:Richard Stiennon

An international treaty and regulatory body will not gain much traction in the military academies and think tanks around the world. Why restrict a nation’s options in war fighting – especially when cyber weapons are inexpensive and could reduce the overall level of force required to achieve an end goal?

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

The Right to Keep and Bear Cyber Arms

August 29, 2012 Added by:Dan Dieterle

With all the media hype over Stuxnet, cyber war and cyber weapons – should US citizens be legally allowed to own and use these weapons in accordance with their 2nd Amendment rights? Why shouldn’t Americans be allowed to actively defend themselves against online electronic risks as well as physical threats?

Comments  (10)

03b2ceb73723f8b53cd533e4fba898ee

U.S. Admits to Cyber Attacks: The Future of Conflict

August 28, 2012 Added by:Pierluigi Paganini

“As a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact... I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations...”

Comments  (0)

924ce315203c17e05d9e04b59648a942

Potential Collateral Damage from an Israeli First Strike on Iran

August 26, 2012 Added by:Richard Stiennon

Carbon whiskers unleashed to disable transformers? Oh yes. Just a few grams got released into the atmosphere and shorted out transformers throughout the Pacific Northwest. I do not like the idea of kilograms of this escaping the target area. It could be decades before power grids are free of this menace...

Comments  (1)

296634767383f056e82787fcb3b94864

The Poor State of Cyber Intelligence

August 23, 2012 Added by:Jeffrey Carr

The state of cyber intelligence as it is practiced by infosec professionals and others who are not trained in the science of rigorous analysis is often exponentially worse. Many analysts are missing huge gaps in the threat landscape and are doing a great disservice to their customers and their craft...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Stuxnet: The New Face of 21st Century Cyber Warfare

August 23, 2012 Added by:Fergal Glynn

In June of 2010 the Stuxnet worm made it’s debut. Joint engineered by the United States and Israel to cripple Iran’s nuclear efforts, it wasn’t long before the worm was altered and turned loose on the internet spawning a number of variations of the original worm and affecting computers around the world...

Comments  (1)

0ff0a77035f9569943049ed3e980bb0d

Giving Aid and Comfort to the Enemy

August 16, 2012 Added by:

Why do the likes of McAfee, Symantec, TrendMicro, Microsoft and Bitdefender publish reverse engineering code examples and analysis on cyber espionage and sabotage tools which serve to delay, disrupt, deny, and deceive our enemies from developing nuclear weapons. This is giving aid and comfort to the enemy...

Comments  (11)

924ce315203c17e05d9e04b59648a942

Cyber Arms Deals and Latin America in the Post-Stuxnet World

August 15, 2012 Added by:Richard Stiennon

The trade of conventional weapons is a multi-billion dollar industry. But when it comes to cyber weapons, developed nations have yet to place limits on what kind of offensive software can be sold. It becomes a necessity to begin some kind of international regulatory system for cyber weapons and the prerequisite expertise...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Gauss Malware and Shadow Warfare

August 14, 2012 Added by:Joel Harding

The International Telegraph Union is the world’s telecommunication governing body. The United States is actively resisting them as the governing body. With Kaspersky’s Gauss discovery, the United States’ argument grows weaker. The US recognizes the advantage it has by having de facto control over the internet...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »