Duqu

Type: Keyphrase
Name: Duqu
First reported Aug 18 2014 - Updated Aug 18 2014 - 1 reports

Hackers Inside Chinese Military Steal U.S. Corporate Trade Secrets

In May, a grand jury in the Western District of Pennsylvaniaindicted five members of the Chinese military on charges ofhacking and economic espionage, according to a May 19 U.S.Department of Justice media release. Per the same release, thetargets were ... [Published Network World Asia - Aug 18 2014]
First reported Aug 15 2014 - Updated Aug 15 2014 - 1 reports

Snowden: NSA working on 'MonsterMind' cyberwar bot

Edward Snowden has described to Wired the final straw that broke the camel's back and turned him into a whistleblower: an NSA project called MonsterMind that would give the agency control of all internet traffic entering the US, the ability to detect ... [Published Sophos Anti Virus - Aug 15 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

Analysis of the Stuxnet Cyber Weapon Family and Dragonfly

Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ... [Published Security Affairs - Aug 04 2014]
First reported Aug 01 2014 - Updated Aug 01 2014 - 2 reports

WatchGuard launches nationwide channel training program

WatchGuard Technologies has brought together its Australian and New Zealand channel distributors and resellers for intensive nationwide training and certification.The aim of the sweeping initiative is to equip its partner community with robust skills ... [Published ARN - Aug 01 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

This emerging malware sends secret messages and is practically impossible to detect

As if computer malware that steals your data weren’t enough, now there’s a new kind to worry about: Malware that does it via covert messages that are practically impossible to detect. And it’s becoming more prevalent, according to a new paper  by researchers ... [Published Quartz - Jul 23 2014]
First reported Jul 20 2014 - Updated Jul 20 2014 - 1 reports

Can India protect itself from cyber threat?

Rajabahadur V Arcot, July 21, 2014: Just think of series of incidents taking place in quick succession across the country that cripples power and water supplies and communication and transportation services to understand their debilitating effects on ... [Published Deccan Herald - Jul 20 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

The Growing Threat Of Network-Based Steganography

Back in 2011, researchers at the Laboratory of Cryptography and System Security in Budapest, Hungary, discovered an unusual form of malicious software. This malware embeds itself in Microsoft Windows machines, gathers information particularly about industrial ... [Published Technology Review - Jul 18 2014]
Entities: Malware, Duqu, Steganography
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

KTR stresses on public private partnership to address challenges of cyber security threats

Hyderabad, July 18:Confederation of Indian industry organized a one day conference on Cyber Security focusing on counter measures to face the threats, here today.Inaugurating the conference, K T Ramarao, Minister for IT & Panchayat Raj, Government of ... [Published Siasat Daily - Jul 18 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

Operation Dragonfly Imperils Industrial Protocol

Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ... [Published McAfee Blogs - Jul 02 2014]
First reported May 13 2014 - Updated May 13 2014 - 1 reports

Cyber Security: A Few Troubling Questions

Rajabahadur V. ArcotWhile information and communication technology continues to contribute in connecting the world and shaping our lives in ways never thought of before, its downside is beginning to cast dark shadows. Hackers and cyber criminals are not ... [Published Industry 2.0 - May 13 2014]
First reported Feb 24 2014 - Updated Feb 24 2014 - 2 reports

South Korea concocting Stuxnet-like virus to infect enemies

Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ... [Published Naked Security - Sophos - Feb 24 2014]

Quotes

...informed about the latest trends in threats to internet security and are knowledgable about which WatchGuard products are suitable for customers. "This also ensures that our channel is able to deliver the best service and appropriate tailored solution to meet an individual customer’s requirement,” he said. Read more: “Nearly 88 per cent of today's malware can morph to avoid detection by signature-based anti-virus solutions" said Robertson
This could have a denial of service effect on applications that are reliant on OPC communications. The OPC acronym comes from "OLE (Object Linking and Embedding) for Process Control and is a software interface standard."
Iranian cyber operations are carried out under the belief that "The cyber arena is actually the arena of the Hidden Imam." [21] Iran’s cyber doctrine relies heavily on asymmetrical warfare tactics...

More Content

All (33) | News (19) | Reports (0) | Blogs (14) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Hackers Inside Chinese Military Steal U.S. Corp... [Published Network World Asia - Aug 18 2014]
Snowden: NSA working on 'MonsterMind' cyberwar bot [Published Sophos Anti Virus - Aug 15 2014]
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
WatchGuard launches nationwide channel training... [Published ARN - Aug 01 2014]
Security focused WatchGuard on warpath to equip... [Published TechDay.co.nz - Aug 01 2014]
This emerging malware sends secret messages and... [Published Quartz - Jul 23 2014]
Can India protect itself from cyber threat? [Published Deccan Herald - Jul 20 2014]
The Growing Threat Of Network-Based Steganography [Published Technology Review - Jul 18 2014]
KTR stresses on public private partnership to a... [Published Siasat Daily - Jul 18 2014]
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Cyber Security: A Few Troubling Questions [Published Industry 2.0 - May 13 2014]
South Korea concocting Stuxnet-like virus to in... [Published Naked Security - Sophos - Feb 24 2014]
South Korea concocting Stuxnet-like virus to in... [Published Security Bloggers Network - Feb 24 2014]
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
New global cyber-espionage operation uncovered [Published telecomasia.net - Feb 17 2014]
Possible state-sponsored cyber attack deemed el... [Published Fierce Government IT - Feb 14 2014]
The Mask Hack "Beyond Anything We've Seen So Far" [Published PCMag.com Security Coverage [Feed] - Feb 11 2014]
Uncovering ‘The Mask’, the most sophisticated m... [Published SiliconANGLE - Feb 11 2014]
The Most Sophisticated Malware Might Hit You Soon! [Published EFYTimes.com - Feb 11 2014]
Details Emerge on Latest Adobe Flash Zero-Day E... [Published threatpost - The First Stop for Security News - Feb 05 2014]
Emergency Adobe Update Patches Flash Zero-Day [Published threatpost - The First Stop for Security News - Feb 04 2014]
Kaspersky Lab Investigating 'Extremely Sophisti... [Published SecurityWeek RSS Feed - Feb 03 2014]
Blog: Destructive Malware - Five Wipers in the ... [Published Securelist - Dec 18 2013]
UK firms not tackling cyber risk, says BIS [Published TCE Today - Nov 27 2013]
US Cyber Command’s Plan X: Pentagon Launching C... [Published RINF.com - Oct 03 2013]
Industrial control ‘honeypots’ show systems are... [Published GCN - Aug 07 2013]
Security experts analyzing Flame malware [Published Topnews.in - May 31 2012]
CanSecWest Day 1 - Pen testing, social authenti... [Published Naked Security - Sophos - Mar 08 2012]
Iran admits nuke facilities targeted by ‘Duqu’ ... [Published Topnews.in - Nov 15 2011]
Iran claims detecting virus aimed at nuclear es... [Published Topnews.in - Nov 15 2011]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ...
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ...
South Korea concocting Stuxnet-like virus to in... [Published Naked Security - Sophos - Feb 24 2014]
Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ...
South Korea concocting Stuxnet-like virus to in... [Published Security Bloggers Network - Feb 24 2014]
Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ...
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
Iranian hacker groups and their allies launched increasing numbers of cyber attacks over the last year, despite strict state controls of Internet traffic including: spying, censorship, and filtering laws and technology.  HPSR has observed an increasing ...
1 2 3
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.