Blog Posts Tagged with "Stuxnet"
December 28, 2011 Added by:Pierluigi Paganini
These are works in progress and they will be improved with components developed to attack strategic targets. Which are the features that we believe may be present in future versions of these dreaded malware? Asking yourself this question is crucial to guide research...
December 21, 2011 Added by:Jeffrey Carr
Senators and Congressmen don't have enough knowledge about cybersecurity to discern truth from fiction, so what starts off as questionable analysis soon becomes terrible government policies, especially when it is advocating for civilian companies to counterattack a nation's network...
December 20, 2011 Added by:Stefano Mele
Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...
December 19, 2011 Added by:Headlines
The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...
December 15, 2011 Added by:Headlines
"Critical infrastructures are still not sufficiently prepared for attacks like DuQu... There are no commonly adopted ICS security standards, guidelines or regulations, corporate management is not sufficiently involved, and there are numerous technical vulnerabilities..."
December 14, 2011 Added by:Scot Terban
Iranian Ambassador Mohammad Hassan Ghadiri discusses the potential for state sponsored attacks on the White House, FBI, CIA, and nuclear power plant systems within the US. The video shows the ambassador talking also asking about how to further the attacks by making certain contacts...
December 12, 2011 Added by:Headlines
“Many SCADA systems were deployed without security in the belief that SCADA would always be isolated from the Internet. But it’s not, and even when it is, attacks such as Stuxnet can circumvent the isolation by using USB memory sticks to spread..."
December 11, 2011 Added by:Robert M. Lee
Cyber warfare took place long before the release of Stuxnet, but its release caused the world to realize the benefits of using a domain of warfare with limited entry costs and the possibility of non-attribution, which is the ability to operate without positively being connected to an operation...
December 09, 2011 Added by:Headlines
"When viewed closely, the photo reveals green dots distributed in columns of increasing length. Each column contains four dots that represent uranium centrifuges. Multiplying these together produces a cascade structure sequence identical to that in Stuxnet..."
December 02, 2011 Added by:Headlines
"May 2006 - Engineers compile code for a component of Stuxnet that will allow them to attack programmable logic controllers, or PLCs, manufactured by Siemens of Germany. Iran's nuclear program uses Siemens PLCs to control the gas centrifuges in its uranium enrichment facilities..."
December 01, 2011 Added by:Dan Dieterle
Be it brute force password hacking or another Stuxnet 0-Day, Duqu shows that Linux is vulnerable to hackers. With a growing install base, supplanting Windows in many facilities, expect it to become even more of a target...
November 29, 2011 Added by:Dan Dieterle
Take a look at a memory dump from a system with Stuxnet - this code has execute and read write permissions. We could go on and find Stuxnet registry key settings, hidden Dll’s, file objects and numerous other artifacts in this memory sample all with using Volatility...
November 28, 2011 Added by:Headlines
"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...
November 21, 2011 Added by:Robin Jackson
Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...
November 18, 2011 Added by:Robert M. Lee
Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013