Items Tagged with "Stuxnet"


03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies New Duqu Trojan Driver Variant

March 20, 2012 Added by:Headlines

Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Nuclear Facility Networks "Under Constant Attack"

March 20, 2012 Added by:Headlines

"Stuxnet showed that airgapping is not a perfect defense. Even in secure systems, people stick in their thumb drives, they go back and forth between computers. They can find vulnerabilities that way. If people put enough attention to it, they can possibly be penetrated..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

What are Cyber Weapons?

March 14, 2012 Added by:Dan Dieterle

"Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the received wisdom on cyber-security..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

A Stuxnet Drinking Game

March 12, 2012 Added by:Joel Harding

If one deconstructs Stuxnet down to its basic functions, nothing is new - but in its execution, success and the huge publicity of its discovery, Stuxnet is a finely manufactured weapon which I expect will be duplicated in its functionality many, many times...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Smart Grid Network Security Spending to Reach $14 Billion

March 12, 2012 Added by:Headlines

"Utilities have – as many predicted – realized that their grids are no longer isolated or protected from attackers. Smart grids need intelligence or they are not smart. Adding that intelligence to grids will increase their attack surface and utilities know this..."

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are DOE and DHS Helping to Secure the Infrastructure or Not?

March 08, 2012 Added by:Joe Weiss

DOE and the utilities are in an effort to secure the Grid. Yet the utilities voted down Version 5 of the NERC CIPs. Many of the devices that have been demonstrated to be vulnerable would not be addressed by NERC. Who is responsible for protecting critical infrastructure?

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

MS08_068 + MS10_046 = FUN UNTIL 2018

March 06, 2012 Added by:Rob Fuller

If you are on an internal penetration test and either exploit a machine or find an open share, you can create an LNK file with an icon that points at a nonexistent share on your attacking machine's IP...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations from RSA, BSides, and GABA

March 03, 2012 Added by:Joe Weiss

Stuxnet was being discussed by many without understanding the controller aspect. Most vendors were using technologies developed for monitoring IT networks and applying them to the SCADA networks. There were very few vendors that were addressing the field controllers...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Cyber Arms Race: Casting Shadows on the Future

March 01, 2012 Added by:Pierluigi Paganini

We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Antivirus Ban for Iran: A Controversial Penalty

February 20, 2012 Added by:Pierluigi Paganini

Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Successfully Eradicates Stuxnet Virus Infestation

February 15, 2012 Added by:Headlines

"I would assume that once Iran learned of Stuxnet, then intelligence agencies looked at this method of cyber attack as compromised regardless of how long it has taken Iran to neutralize it. It is a cat and mouse game..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Remains Defiant in Confronting Cyber Attacks

February 14, 2012 Added by:Headlines

"Iranian experts possess adequate knowledge to confront cyber threats. All nuclear facilities in the country are immune from cyber attacks... Many viruses are produced in the world every day... there has been no destructive impact inside the country," said Gholam-Reza Jalali...

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

What's More Important - Vulnerabilities or Actual Incidents?

February 13, 2012 Added by:Joe Weiss

To at least some of us in the control systems community these vulnerabilities are not unexpected. The fact that many of these systems are also connected to the Internet as Eireann Leverett demonstrated is also not new, even though the numbers of control system connected to the Internet are striking.

Comments  (0)

48ee5cc2faa38ddec15846777f57f1a6

Hidebound Governments Unprepared for Cyber Threats

February 05, 2012 Added by:James Colbert

“Even if they brilliantly secure their networks, the greatest threat that organizations face is that they are still vulnerable if their minimum wage security guards are disgruntled or their physical access control systems can be easily bypassed...”

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Stuxnet: Are We Safe Now? Of Course Not...

January 31, 2012 Added by:Pierluigi Paganini

We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »