Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?

Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?


Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?

Posted:

InfoSec News: Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?: http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant
By Mark Clayton Staff writer September 21, 2010
Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.
At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.
The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.
Unlike most malware, Stuxnet is not intended to help someone make money or steal proprietary data. Industrial control systems experts now have concluded, after nearly four months spent reverse engineering Stuxnet, that the world faces a new breed of malware that could become a template for attackers wishing to launch digital strikes at physical targets worldwide. Internet link not required.
[...]

White House reviews nation's cybersecurity

Posted:

InfoSec News: White House reviews nation's cybersecurity: http://www.washingtonpost.com/wp-dyn/content/article/2010/09/23/AR2010092305431.html
By Ellen Nakashima Washington Post Staff Writer September 23, 2010
The White House is reviewing whether to ask for new authorities for the Defense Department and other government agencies to ensure that the [...]

Cisco releases critical IOS security patches

Posted:

InfoSec News: Cisco releases critical IOS security patches: http://www.computerworld.com/s/article/9187320/Cisco_releases_critical_IOS_security_patches
By Robert McMillan IDG News Service September 22, 2010
Cisco has released its twice-yearly set of security updates for its switches and routers.
There are six advisories in all, each one covering a different component of the Cisco Internetwork Operating System (IOS), which powers the routers. They cover IOS components such as Cisco's VPN software, the Session Initiation Protocol (SIP), and Internet Group Management Protocol, and Network Address Translation (NAT) software.
Released Wednesday, the updates fix 12 bugs. An attacker could possibly leverage some of them to crash the router, Cisco says.
[...]

Secunia Weekly Summary - Issue: 2010-38

Posted:

InfoSec News: Secunia Weekly Summary - Issue: 2010-38: ========================================================================
The Secunia Weekly Advisory Summary 2010-09-16 - 2010-09-23
This week: 75 advisories [...]

National Assembly probe into IT security breach

Posted:

InfoSec News: National Assembly probe into IT security breach: http://www.walesonline.co.uk/news/welsh-politics/welsh-politics-news/2010/09/23/national-assembly-probe-into-it-security-breach-91466-27324949/
By Martin Shipton Western Mail WalesOnline.co.uk Sept 23 2010
NATIONAL ASSEMBLY officials have launched an investigation into how a [...]

0 comments:

Post a Comment