Blog Posts Tagged with "Iran"
March 29, 2012 Added by:Pierluigi Paganini
I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?
March 01, 2012 Added by:Pierluigi Paganini
We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...
February 20, 2012 Added by:Pierluigi Paganini
Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...
February 15, 2012 Added by:Headlines
"I would assume that once Iran learned of Stuxnet, then intelligence agencies looked at this method of cyber attack as compromised regardless of how long it has taken Iran to neutralize it. It is a cat and mouse game..."
February 14, 2012 Added by:Headlines
"Iranian experts possess adequate knowledge to confront cyber threats. All nuclear facilities in the country are immune from cyber attacks... Many viruses are produced in the world every day... there has been no destructive impact inside the country," said Gholam-Reza Jalali...
February 13, 2012 Added by:Dan Dieterle
A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...
January 31, 2012 Added by:Pierluigi Paganini
We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...
January 03, 2012 Added by:Joel Harding
Now in the very likely propaganda department… The Voice of Russia is stating in an article published recently that Iran is offering access to their recently acquired RQ-170 Sentinel, reputedly a captured CIA collection platform, to Russia and China...
January 02, 2012 Added by:Pierluigi Paganini
But are we sure that this is true? No one doubts Iran's capabilities, but there is no doubt that their means and financial resources are nothing compared to those of the U.S., China, Israel and Russia. Although we are faced with a Nation that has fully understood the importance of a cyber strategy, we cannot certainly consider it more offensive than others...
December 28, 2011 Added by:Pierluigi Paganini
These are works in progress and they will be improved with components developed to attack strategic targets. Which are the features that we believe may be present in future versions of these dreaded malware? Asking yourself this question is crucial to guide research...
December 20, 2011 Added by:Joel Harding
Iran is claiming that an “electronic warfare” unit forced down an US RQ-170 Sentinel Drone through a cyber attack. The Iranians are saying they are close to uncovering all the secrets contained in the drone and unlocking the software. Instead of a detailed explanation, I just say BS...
December 19, 2011 Added by:Headlines
The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...
December 18, 2011 Added by:Infosec Island Admin
The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...
December 17, 2011 Added by:Joel Harding
Cyber attack? Oh come on now. This would be a highly complex operation and I doubt even the Russians have that capability. First you would need to inject the proper commands into the system. Then, you’d have to establish a link through the CandC network from Beale or Creech Air Force Base...
December 15, 2011 Added by:Ron Baklarz
While it is reported that intercepting unencrypted drone communication data streams had first been known to US military since the mid-1990's, this exploitation continued on into 2009 where militant laptops were found with drone data and unencrypted video feeds from Predator drones...
December 14, 2011 Added by:Infosec Island Admin
Iranian Ambassador Mohammad Hassan Ghadiri discusses the potential for state sponsored attacks on the White House, FBI, CIA, and nuclear power plant systems within the US. The video shows the ambassador talking also asking about how to further the attacks by making certain contacts...
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 04-24-2014
Stopping Remote Access Breaches with “Hone... Pakhi Chopra on 04-24-2014
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-23-2014