Ralph Langner

Type: Person
Name: Ralph Langner
First reported Apr 12 2014 - Updated Apr 12 2014 - 1 reports

DHS alert: Heartbleed may have been used against industrial control systems

Specifically, there are unconfirmed reports that the Heartbleed cybervulnerability has been used to attack encrypted communications systems of these control systems. DHS is investigating. The threat from the cybervulnerability dubbed Heartbleed reaches ... [Published Christian Science Monitor - Apr 12 2014]
First reported Apr 11 2014 - Updated Apr 11 2014 - 1 reports

XP EoL As A Valuable Experience

Let me give you a real world anecdote to provide a little context about my comment to Kelly Jackson Higgins over at Dark Reading that the Windows XP end of life was in many ways a positive experience for ICS organizations that care about security ... [Published Digital Bond's SCADA Security Portal - Apr 11 2014]
First reported Apr 09 2014 - Updated Apr 09 2014 - 1 reports

Heartbleed Internet Bug: Pretext For Web Lockdown?

U.S. government was responsible for creating previous virusesPaul Joseph WatsonPrison Planet.comThe Heartbleed bug is being described as the most critical security flaw to hit the web since its inception, a crisis that could lay the groundwork for massive ... [Published PrisonPlanet - Apr 09 2014]
First reported Apr 08 2014 - Updated Apr 08 2014 - 1 reports

S4x14 Video: Are Risk Based Approaches Bound to Fail?

The Great Debate topic for S4x14 was: Are Risk Based Approaches Bound to Fail in Securing Critical Infrastructure ICS? The idea for the topic was a Bound to Fail paper by Ralph Langner and Perry Pederson for the Brookings Institution. We had Jim ... [Published Digital Bond's SCADA Security Portal - Apr 08 2014]
First reported Mar 25 2014 - Updated Mar 25 2014 - 3 reports

Ukraine Crisis, Target Breach, and Edward Snowden: What's Next for U.S. Cyber Policy?

What does the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ... [Published Brookings Institution - Mar 25 2014]
First reported Mar 19 2014 - Updated Mar 19 2014 - 2 reports

Defending Cyber Dominance

Editor's Note: In a speech to the Cyber, Space and Intelligence Association, Ralph Langner observes that the United States has utilized the last decade to identify cyberspace as a domain for military operations and become the unchallenged leader of cyber ... [Published Brookings Institution - Mar 19 2014]
First reported Mar 18 2014 - Updated Mar 18 2014 - 1 reports

Is Analog the Fix For Cyber Terrorism?

chicksdaddy writes "The Security Ledger has picked up on an opinion piece by noted cyber terrorism and Stuxnet expert Ralph Langner (@langnergroup) who argues in a blog post that . Langner cautions against the wholesale embrace of digital systems by stating ... [Published Slashdot - Mar 18 2014]
First reported Feb 05 2014 - Updated Feb 05 2014 - 1 reports

JPCERT Conference Coverage and Comment

This was the 7th year that JPCERT put on an ICS Security Conference in Tokyo. The conference hall had a capacity of 300 people, and it was sold out weeks before the event. Of course the price was very appealing — free. Great to see the increased interest ... [Published Digital Bond's SCADA Security Portal - Feb 05 2014]
First reported Jan 23 2014 - Updated Jan 23 2014 - 1 reports

An ICS Cyber Vulnerability Beyond Stuxnet

Ralph Langner and other ICS cyber security experts have warned that the critical ICS vulnerabilities that can cause significant damage and/or personal injuries lie in the functional design of the instrumentation and control systems. Additionally, a presentation ... [Published Infosec Island - Jan 23 2014]
First reported Dec 09 2013 - Updated Dec 09 2013 - 1 reports

Missed by NIST

NIST (The National Institute of Standards and Technology) issued for comments a “Discussion Draft of the Preliminary Cybersecurity Framework” on August 28, 2013, available at www.nist.gov/itl/cyberframework.cfm The draft document is the result of the ... [Published Security Bloggers Network - Dec 09 2013]
First reported Nov 30 2013 - Updated Dec 01 2013 - 1 reports

Recommended Reading: Stuxnet's more dangerous precursor, fake memories and more

Recommended Reading highlights the best long-form writing on technology in print and on the web. Some weeks, you'll also find short reviews of books dealing with the subject of technology that we think are worth your time. We hope you enjoy the read. ... [Published Engadget - Nov 30 2013]
First reported Nov 20 2013 - Updated Nov 20 2013 - 1 reports

Stuxnet Expert Ralph Langner Offers Reverse Engineering Analysis

The post Stuxnet Expert Ralph Langner Offers Reverse Engineering Analysis appeared first on The State of Security . ... [Published Security Bloggers Network - Nov 20 2013]

More Content

All (23) | News (7) | Reports (0) | Blogs (16) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
DHS alert: Heartbleed may have been used agains... [Published Christian Science Monitor - Apr 12 2014]
XP EoL As A Valuable Experience [Published Digital Bond's SCADA Security Portal - Apr 11 2014]
Heartbleed Internet Bug: Pretext For Web Lockdown? [Published PrisonPlanet - Apr 09 2014]
S4x14 Video: Are Risk Based Approaches Bound to... [Published Digital Bond's SCADA Security Portal - Apr 08 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Institution - Mar 25 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Latest From Brookings - Mar 25 2014]
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Up Front - Mar 25 2014]
Defending Cyber Dominance [Published Brookings Institution - Mar 19 2014]
Defending Cyber Dominance [Published Brookings: Latest From Brookings - Mar 19 2014]
Is Analog the Fix For Cyber Terrorism? [Published Slashdot - Mar 18 2014]
JPCERT Conference Coverage and Comment [Published Digital Bond's SCADA Security Portal - Feb 05 2014]
An ICS Cyber Vulnerability Beyond Stuxnet [Published Infosec Island - Jan 23 2014]
Missed by NIST [Published Security Bloggers Network - Dec 09 2013]
Recommended Reading: Stuxnet's more dangerous p... [Published Engadget - Nov 30 2013]
TED News in Brief: A dance that explains chicke... [Published TED Blog - Nov 27 2013]
Stuxnet: new light through old windows [Published Malwarebytes Unpacked - Nov 25 2013]
Stuxnet, der Ältere: Der bösartige Bruder [Published TechNet Blogs - Nov 25 2013]
Stuxnet worm analyzed as world's first true cyb... [Published PC World: Techlog - Nov 24 2013]
The secret twin of Stuxnet [Published Boing Boing - Nov 21 2013]
The Stuxnet Worm Had an Older More Evil Twin [Published Fooyoh - Nov 21 2013]
Stuxnet Expert Ralph Langner Offers Reverse Eng... [Published Security Bloggers Network - Nov 20 2013]
Cyber Weapons: Stuxnet's Secret Twin [Published Brookings: Latest From Brookings - Nov 19 2013]
Cyberwar - história e a evolução a longo dos úl... [Published Forense Digital - Mar 13 2011]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
IT
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
XP EoL As A Valuable Experience [Published Digital Bond's SCADA Security Portal - Apr 11 2014]
Let me give you a real world anecdote to provide a little context about my comment to Kelly Jackson Higgins over at Dark Reading that the Windows XP end of life was in many ways a positive experience for ICS organizations that care about security ...
S4x14 Video: Are Risk Based Approaches Bound to... [Published Digital Bond's SCADA Security Portal - Apr 08 2014]
The Great Debate topic for S4x14 was: Are Risk Based Approaches Bound to Fail in Securing Critical Infrastructure ICS? The idea for the topic was a Bound to Fail paper by Ralph Langner and Perry Pederson for the Brookings Institution. We had Jim ...
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Latest From Brookings - Mar 25 2014]
What do the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ...
Ukraine Crisis, Target Breach, and Edward Snowd... [Published Brookings Up Front - Mar 25 2014]
What does the crisis in Ukraine, the resignation of Target’s chief information officer, and the effect of Edward Snowden on European legislators all have in common? According to Brookings cybersecurity experts, they are all going to be central to the ...
Defending Cyber Dominance [Published Brookings: Latest From Brookings - Mar 19 2014]
Editor's Note: In a speech to the Cyber, Space and Intelligence Association, Ralph Langner observes that the United States has utilized the last decade to identify cyberspace as a domain for military operations and become the unchallenged leader of ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.