Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
If a statement from Gholam-Reza Jalali – the head of Iran’s Passive Defense Organization – is to be believed, it seems that Iran’s computers have been …
A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet …
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
The latest results of a Symantec study concentrating on the Stuxnet worm revealed that its developers knew what they were doing – once finished, it took only 12 hours to …
The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …