Blog Posts Tagged with "Tilded"
July 30, 2012 Added by:Pierluigi Paganini
In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...
June 11, 2012 Added by:Headlines
"Despite the fact that Stuxnet has been the subject of in-depth analysis... the mysterious 'resource 207' from 2009 has gone largely unnoticed. But it turns out that this is the missing link between Flame and Stuxnet... Clearly, these two pieces of exploit code were written by the same programmer..."
April 15, 2012 Added by:Robert M. Lee
An important aspect of the conference was the ability to network with people from a wide variety of sectors. Establishing new connections, sources of information, and building friendships opens up avenues for much needed information sharing. Emphasis must be placed on education...
April 02, 2012 Added by:Robert M. Lee
Stuxnet had a major impact on ICS/SCADA. It revealed vulnerabilities that many cyber security experts in that community had been warning about for years. Moreover, it showed that nation-states are willing to target these systems if it helps the success of a mission...
March 29, 2012 Added by:Pierluigi Paganini
I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?
January 25, 2012 Added by:Pierluigi Paganini
Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...
Thought Experiment: Mandatory Online Banking... Eden Connie on 01-28-2015
Today's Mobile Device Data Protection Must G... Jonathan Miller on 01-28-2015
New Legislation on Threat Intelligence Shari... ut ut on 01-28-2015