Stuxnet

Type: Keyphrase
Name: Stuxnet
First reported 19 hours ago - Updated 4 hours ago - 4 reports

Basic hacks can compromise industrial control systems

Atlanta -- Sophisticated attacks like Stuxnet aren't necessary to compromise industrial control systems for dams, power plants, chemical plants and the like. Rather, simple phishing attacks followed up by using tools that are easily available through ... [Published Techworld.com Security - 4 hours ago]
First reported 11 hours ago - Updated 11 hours ago - 1 reports

What to do about ICS cyber security threats?

Stuxnet, Shamoon, Heartbleed, Energetic Bear, and other cyber-security attacks keep coming with no end in sight. No one wants their industrial control system (ICS) to be the next target. So, what are the biggest threats to ICSs (Fig. 1) and what can be ... [Published Hydrocarbon Processing - 11 hours ago]
First reported Sep 30 2014 - Updated Sep 30 2014 - 1 reports

Eugene Kaspersky: 'traditional crime is coming to cyberspace'

Most cybercrime has historically concentrated on causing disruption in cyberspace, but Eugene Kaspersky, who lends his name to the internet security company Kaspersky Lab, tells Sophie Curtis that traditional 'real world' criminals are also moving online ... [Published Telegraph - Sep 30 2014]
First reported Sep 30 2014 - Updated Sep 30 2014 - 1 reports

27c3 - Adventures in analyzing Stuxnet

Adventures in analyzing StuxnetThere has been many publications on the topic of Stuxnet and its "sophistication" in the mainstream press. However, there is not a complete publication which explains all of the technical vulnerability details and how they ... [Published SecurityTube.Net - Sep 30 2014]
First reported Sep 29 2014 - Updated Sep 29 2014 - 1 reports

Dragonfly/Havex Targeting Pharmaceutical Sector

Dragonfly/Havex Targeting Pharmaceutical Sector The Dragonfly malware previously thought to be focused exclusively on the critical energy and chemical sectors is now thought to be more likely targeting pharmaceutical companies. In the first of four ... [Published Infosecurity - Latest News - Sep 29 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

19 million Windows PCs still vulnerable to Stuxnet zero-day

The Stuxnet worm is still threatening IT systems some three years after its role in damaging Iranian nuclear equipment. ... [Published Latest articles from SC Magazine UK News - Sep 26 2014]
Entities: Stuxnet, zero-day, Nuclear
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Middle East Energy Industry Vulnerable to Cyber Attacks; Preventive Security Measures Imperative to Protect Critical Infrastructure

The energy industry is among the largest and most important industries in many industrialized nations. Of the ten largest companies in the world, seven are energy producers and/or related providers [1] . The Middle East power sector is booming and is ... [Published Web-Release.info - Sep 25 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

AGENTS WANTED Israel's Mossad steps into open with recruitment drive

Israel's legendary spy agency, the Mossad, has long been suspected of having a hand in the Stuxnet computer worm that wreaked havoc in Iran's nuclear program in 2010. (Reuters)There was a time when the recruiting methods of the Mossad were as secretive ... [Published Bayou Buzz - Sep 25 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

Kaspersky Lab: 19 million Windows systems encounter Stuxnet in just 8 months

Over 19 million Microsoft Windows systems across the world continue to encounter the notorious Stuxnet malware due to the reluctance by users in emerging countries to upgrade from Windows XP to a new version of the OS.Related: “How to protect from a Stuxnet ... [Published ITProPortal.com - Sep 16 2014]
First reported Sep 15 2014 - Updated Sep 15 2014 - 3 reports

Dragonfly malware targeting pharmaceutical companies

The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden.Until now, advanced cyberattacks against industry have focused on the critical energy and ... [Published Net Security - Sep 15 2014]
First reported Sep 12 2014 - Updated Sep 12 2014 - 1 reports

Reporter who uncovered the Stuxnet computer worm to speak at URI

SOUTH KINGSTOWN, R.I. _ An award-winning journalist and author known for her investigative work on the computer worm that compromised Iran’s nuclear program will speak Tuesday, Sept. 23 at 7:30 p.m. at the University of Rhode Island.Journalist Kim Zetter ... [Published Providence Journal - Sep 12 2014]
First reported Sep 07 2014 - Updated Sep 07 2014 - 2 reports

The Iranian authorities have tied Ukrainians suspected terrorist attack on a nuclear power plant

Law enforcement Iran has tied the citizen of Ukraine, who is suspected in the terrorist attack on the country's only nuclear power plant in Bushehr, informs on Sunday the Agency." Ukrainian specialist " penetrated " Busher " together with the Russian ... [Published RIN.ru - Sep 07 2014]

Quotes

"There is not a nation in the world which is able to do it in a short period of time, so we are in danger because these systems are vulnerable and we can’t fix them right now."
...under which scenarios could a cyber attack cause the kind of terror among the population that terrorists hope to achieve?" the paper suggested. "Second, is a cyber attack actually the easiest way for terrorists to achieve that goal or are traditional methods cheaper and more effective?"
...of those affected and the deep respect of the security community," said Alex Andrianopoulos, vice president, Marketing for Guidance Software. "His unique analysis of cyber threats and the ways that cybercriminals operate will be invaluable for CEIC attendees looking to stay a step ahead of the nefarious actors in today's complex security environment."
...business had endpoint security installed, which regularly updated signatures, patched as necessary, scanned regularly, and users were good to go. "The usual array of threats, viruses, worms, spyware and adware were no longer a worry."

More Content

All (318) | News (172) | Reports (0) | Blogs (146) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Basic hacks can compromise industrial control s... [Published Techworld.com Security - 4 hours ago]
Obama's Loose Lips [Published American Thinker - 5 hours ago]
What to do about ICS cyber security threats? [Published Hydrocarbon Processing - 11 hours ago]
Expert: Basic hacks can compromise industrial c... [Published CIO Australia - 18 hours ago]
Expert: Basic hacks can compromise industrial c... [Published Computerworld - Security RSS feed - 18 hours ago]
Expert: Basic hacks can compromise industrial c... [Published NetworkWorld - 19 hours ago]
Cyber Warfare in Cars [Published Forbes.com - 20 hours ago]
Security Theater ICS Webisode [Published Digital Bond's SCADA Security Portal - 23 hours ago]
Derbycon 2014 - Passing the Torch: Old School R... [Published SecurityTube.Net - Sep 30 2014]
Eugene Kaspersky: 'traditional crime is coming ... [Published Telegraph - Sep 30 2014]
27c3 - Adventures in analyzing Stuxnet [Published SecurityTube.Net - Sep 30 2014]
Dragonfly/Havex Targeting Pharmaceutical Sector [Published Infosecurity - Latest News - Sep 29 2014]
Cyberterrorism (Probably) Isn't Terrifying Enou... [Published Motherboard Magazine - Sep 29 2014]
Redpoint: Schneider/Modicon PLC Enumeration [Published Digital Bond's SCADA Security Portal - Sep 29 2014]
Cybercrime Expert Brian Krebs to Deliver Keynot... [Published Scottrade - Sep 29 2014]
Electronic I.D. Card project in Nigeria: How no... [Published Vigilance Security Magazine - Sep 29 2014]
19 million Windows PCs still vulnerable to Stux... [Published Latest articles from SC Magazine UK News - Sep 26 2014]
Industrial Control Systems Equipment Difficult ... [Published Softpedia - Sep 26 2014]
Five Ways Cyberterrorists Could Target the U.S. [Published Huffington Post - Sep 25 2014]
Middle East Energy Industry Vulnerable to Cyber... [Published Web-Release.info - Sep 25 2014]
AGENTS WANTED Israel's Mossad steps into open... [Published Bayou Buzz - Sep 25 2014]
New Industrial Security article: ICS Security f... [Published Automation World - Sep 25 2014]
Israel's legendary Mossad steps out of the shad... [Published FOXNews.com - Sep 24 2014]
Are Cyber Attacks More than Critical Infrastruc... [Published Security Magazine - Sep 24 2014]
Endpoint security is not dead [Published The Marketing Site - Sep 23 2014]
Endpoint security is not dead [Published IT Web - Sep 23 2014]
New Research Reveals Dragonfly Malware Likely T... [Published Automation World - Sep 22 2014]
NOVA: Rise Of The Hackers [Published KPBS - Sep 22 2014]
PBS NOVA Rise of the Hackers Premieres Wednesda... [Published Monsters and Critics - Sep 19 2014]
Taking security to a new level [Published IT Web - Sep 19 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Basic hacks can compromise industrial control s... [Published Techworld.com Security - 4 hours ago]
Atlanta -- Sophisticated attacks like Stuxnet aren't necessary to compromise industrial control systems for dams, power plants, chemical plants and the like. Rather, simple phishing attacks followed up by using tools that are easily available through ...
Expert: Basic hacks can compromise industrial c... [Published Computerworld - Security RSS feed - 18 hours ago]
Atlanta -- Sophisticated attacks like Stuxnet aren't necessary to compromise industrial control systems for dams, power plants, chemical plants and the like. Rather, simple phishing attacks followed up by using tools that are easily available through ...
Security Theater ICS Webisode [Published Digital Bond's SCADA Security Portal - 23 hours ago]
ICS-CERT published an advisory on web server vulnerabilities in Schneider Electric PLC’s including Quantums, Momentums, TSX and other Modicon models. It is a near perfect example of what is wrong with DHS and PLC vendors and in a way the ICSsec ...
Derbycon 2014 - Passing the Torch: Old School R... [Published SecurityTube.Net - Sep 30 2014]
APT X- Target- Stuxnet; the media and public have started to pay more and more attention to sophisticated attackers and the havoc they can wreck. As evidence of advanced com promises becomes increasingly apparent- companies have begun to move beyond simple ...
27c3 - Adventures in analyzing Stuxnet [Published SecurityTube.Net - Sep 30 2014]
Adventures in analyzing StuxnetThere has been many publications on the topic of Stuxnet and its "sophistication" in the mainstream press. However, there is not a complete publication which explains all of the technical vulnerability details and how they ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.