Stuxnet

Latest stories

1d
The Register
Ruskie ICS hacker drops nine holes in popular Siemens power plant kitIlya Karpov of Russian security outfit Positive Technologies has reported nine
Ruskie ICS hacker drops nine holes in popular Siemens power plant kit
The Register / Posted yesterday
Ilya Karpov of Russian security outfit Positive Technologies has reported nine vulnerabilities in Siemens industrial control system kit used in critical operations from petrochemical labs and power plants up to the Large Hadron Collider. The holes,... Read more
4d
Zero Hedge
Air Conditioner Failure At CenturyLink Data Center Takes ITG Dark Pool OfflineI believe they call this "fragility". I say Bullshit. And that's my boy Putin
Air Conditioner Failure At CenturyLink Data Center Takes ITG Dark Pool Offline
Zero Hedge / Posted 4 days ago
I believe they call this "fragility". I say Bullshit. And that's my boy Putin letting you know he is not dead I tweeted this out around noon today. ITG lost all street connectivity. Lost of substitute brokers had to take up the slack of buy side... Read more
7d
The Register
Gored Ashley Madison love nest stumps up $500k for hacker's headsThe much-hacked and hated sexual sin-bin Ashley Madison is offering $500,000 Ca
Gored Ashley Madison love nest stumps up $500k for hacker's heads
The Register / Posted 7 days ago
The much-hacked and hated sexual sin-bin Ashley Madison is offering $500,000 Canadian Dollars (US$377,000) to anyone who can provide information leading to the arrest of the those behind its hacking. Records on some 30 million members of the online... Read more
8d
Op-Ed News
Obama Should Charge Clinton With EspionageHillary Clinton should be charged with espionage. Not really. And I don't think
Obama Should Charge Clinton With Espionage
Op-Ed News / Posted 8 days ago
Hillary Clinton should be charged with espionage. Not really. And I don't think she will be. But if the Obama administration is going to be consistent in its treatment of those who leak classified information, Clinton ought to face charges under the... Read more
12d
Computing.co.uk
“A lot of attacks from Western countries go through China,” says Bruce SchneierThe former chief technology officer of BT Managed Security Solutions, now CTO a
“A lot of attacks from Western countries go through China,” says Bruce Schneier
Computing.co.uk / Posted 12 days ago
The former chief technology officer of BT Managed Security Solutions, now CTO at Resilient Systems, had expressed scepticism at the time of the attack that the secretive dictatorship had been behind the attack, motivated by the theme of the film: two... Read more
12d
The Register
Bruce Schneier: 'We're in early years of a cyber arms race'LinuxCon 2015 Security guru Bruce Schneier says there's a kind of cold war now
Bruce Schneier: 'We're in early years of a cyber arms race'
The Register / Posted 12 days ago
LinuxCon 2015 Security guru Bruce Schneier says there's a kind of cold war now being waged in cyberspace, only the trouble is we don't always know who we're waging it against. Schneier appeared onscreen via Google Hangouts at the... Read more
13d
Slate
Auto Companies Should Be Very Worried About Car Hacking. So Should You.Last month, Wired published an article with a headline that sounds like absurdi
Auto Companies Should Be Very Worried About Car Hacking. So Should You.
Slate / Posted 13 days ago
Last month, Wired published an article with a headline that sounds like absurdist science fiction: “Hackers Remotely Kill a Jeep on the Highway—With Me in It.” Two security specialists had figured out how to hack into a Jeep Cherokee’s onboard... Read more
2 related stories
14d
Minot Daily News
Iran should reconsiderAfter all, we are volunteering to help defend the nuclear weapons program Iran
Iran should reconsider
Minot Daily News / Posted 14 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
14d
The Leader-Herald
Obama aids IranAfter all, we are volunteering to help defend the nuclear weapons program Iran
Obama aids Iran
The Leader-Herald / Posted 14 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
15d
The New Ulm Journal
Iran’s new buddyAfter all, we are volunteering to help defend the nuclear weapons program Iran
Iran’s new buddy
The New Ulm Journal / Posted 15 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
15d
The Lewistown Sentinel
Nuke deal with Iran will leave U.S. compromisedAfter all, we are volunteering to help defend the nuclear weapons program Iran
Nuke deal with Iran will leave U.S. compromised
The Lewistown Sentinel / Posted 15 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
15d
The Martinsburg Journal
Friend or Foe?: Obama seems to be doing Iran a favorAfter all, we are volunteering to help defend the nuclear weapons program Iran
Friend or Foe?: Obama seems to be doing Iran a favor
The Martinsburg Journal / Posted 15 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
15d
The Alpena News
Deal would have US protecting IranAfter all, we are volunteering to help defend the nuclear weapons program Iran
Deal would have US protecting Iran
The Alpena News / Posted 15 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
5 related stories
15d
Canberra Times
Kaspersky faked malware to harm rivals, ex-employees claimMoscow-based KAspersky Lab is one of the biggest antivirus companies in the wor
Kaspersky faked malware to harm rivals, ex-employees claim
Canberra Times / Posted 15 days ago
Moscow-based KAspersky Lab is one of the biggest antivirus companies in the world. Photo: Reuters Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the... Read more
21 related stories
15d
The Washington Times
MORTON KLEIN, DANIEL MANDEL: How Obama gets it wrong on IranDefending the Iran nuclear deal he negotiated in Vienna, Secretary of State Joh
MORTON KLEIN, DANIEL MANDEL: How Obama gets it wrong on Iran
The Washington Times / Posted 15 days ago
Defending the Iran nuclear deal he negotiated in Vienna, Secretary of State John Kerry has repeatedly asserted something that has been much ignored in the discussion surrounding it — that all options which the United States possesses today to stop... Read more
16d
iTNews
Kaspersky faked malware to harm rivals: Ex-employeesCompany strongly denies allegations. Over a decade, one of the largest securit
Kaspersky faked malware to harm rivals: Ex-employees
iTNews / Posted 16 days ago
Company strongly denies allegations. Over a decade, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals by tricking their antivirus software programs into classifying benign files as malicious,... Read more
21 related stories
16d
TribLIVE
Experts: In cyber warfare, deterrence a challenge but may be key to nation’s defenseThe United States' best defense against a crippling cyber attack could be a mor
Experts: In cyber warfare, deterrence a challenge but may be key to nation’s defense
TribLIVE / Posted 16 days ago
The United States' best defense against a crippling cyber attack could be a more visible offense, military leaders and other experts recently suggested at the Army War College in Carlisle. Then they stopped talking. The nation's cyber attack... Read more
16d
KPBS San Diego
Stuxnet Raises 'Blowback' Risk In CyberwarThe Stuxnet computer worm, arguably the first and only cyber superweapon ever d
Stuxnet Raises 'Blowback' Risk In Cyberwar
KPBS San Diego / Posted 16 days ago
The Stuxnet computer worm, arguably the first and only cyber superweapon ever deployed, continues to rattle security experts around the world, one year after its existence was made public. Apparently meant to damage centrifuges at a uranium... Read more
17d
The Register
I've seen Kaspersky slap his staff with a walrus penis – and even I doubt the false-positive claimsComment Eugene Kaspersky is a complex character and capable of many things, but
I've seen Kaspersky slap his staff with a walrus penis – and even I doubt the false-positive claims
The Register / Posted 17 days ago
Comment Eugene Kaspersky is a complex character and capable of many things, but Friday's allegations that he ordered staff to deliberately sabotage rival antivirus packages smells fishy. On the one hand, the problem of AV products flagging up false... Read more
21 related stories
17d
Calgary Sun
Antivirus firm Kaspersky faked malware to harm rivals:workersSAN FRANCISCO - Beginning more than a decade ago, one of the largest security c
Antivirus firm Kaspersky faked malware to harm rivals:workers
Calgary Sun / Posted 17 days ago
SAN FRANCISCO - Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as... Read more
21 related stories
17d
The Huffington Post
Top Antivirus Firm Allegedly Created Malware To Harm CompetitorsSAN FRANCISCO (Reuters) - Beginning more than a decade ago, one of the largest
Top Antivirus Firm Allegedly Created Malware To Harm Competitors
The Huffington Post / Posted 17 days ago
SAN FRANCISCO (Reuters) - Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying... Read more
21 related stories
17d
Philly.com
EXCLUSIVE-employees: Russian antivirus firm faked malware to harm rivalsKaspersky Lab strongly denied that it had tricked competitors into categorizing
EXCLUSIVE-employees: Russian antivirus firm faked malware to harm rivals
Philly.com / Posted 17 days ago
Kaspersky Lab strongly denied that it had tricked competitors into categorizing clean files as malicious, so-called false positives. "Our company has never conducted any secret campaign to trick competitors into generating false positives to damage... Read more
21 related stories
17d
Entrpreneur
Ex-Employees Say Antivirus Giant Faked Malware to Damage RivalsBeginning more than a decade ago, one of the largest security companies in the
Ex-Employees Say Antivirus Giant Faked Malware to Damage Rivals
Entrpreneur / Posted 17 days ago
Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious,... Read more
21 related stories
17d
RTE News
Kaspersky accused of trying to undermine rivalsBeginning more than a decade ago, one of the largest security companies in the
Kaspersky accused of trying to undermine rivals
RTE News / Posted 17 days ago
Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programmes into classifying benign files as malicious,... Read more
21 related stories
17d
Reuters UK Edition
employees - Russian antivirus firm faked malware to harm rivalsEmployees work at the headquarters of Kaspersky Labs, a company which specialis
employees - Russian antivirus firm faked malware to harm rivals
Reuters UK Edition / Posted 17 days ago
Employees work at the headquarters of Kaspersky Labs, a company which specialises in the production of antivirus and internet security software, in Moscow July 29, 2013. SAN FRANCISCO Beginning more than a decade ago, one of the largest security... Read more
21 related stories
17d
iol.co.za
Kaspersky ‘tricked’ rivalsSan Francisco - Beginning more than a decade ago, one of the largest security c
Kaspersky ‘tricked’ rivals
iol.co.za / Posted 17 days ago
San Francisco - Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as... Read more
21 related stories
17d
Business Insider
Russian antivirus firm Kaspersky faked malware to harm rivals, according to former employeesBeginning more than a decade ago, one of the largest security companies in the
Russian antivirus firm Kaspersky faked malware to harm rivals, according to former employees
Business Insider / Posted 17 days ago
Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus-software programs into classifying benign files as malicious,... Read more
21 related stories
18d
Channel NewsAsia
employees: Russian antivirus firm faked malware to harm rivalsSAN FRANCISCO: Beginning more than a decade ago, one of the largest security co
employees: Russian antivirus firm faked malware to harm rivals
Channel NewsAsia / Posted 18 days ago
SAN FRANCISCO: Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as... Read more
21 related stories
18d
Reuters UK Edition
Russian antivirus firm faked malware to harm rivals -employeesSAN FRANCISCO Beginning more than a decade ago, one of the largest security com
Russian antivirus firm faked malware to harm rivals -employees
Reuters UK Edition / Posted 18 days ago
SAN FRANCISCO Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as... Read more
21 related stories
18d
Reuters
Russian antivirus firm faked malware to harm rivals -employeesSAN FRANCISCO Beginning more than a decade ago, one of the largest security com
Russian antivirus firm faked malware to harm rivals -employees
Reuters / Posted 18 days ago
SAN FRANCISCO Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as... Read more
21 related stories
18d
The Intelligencer and Wheeling News-Register
Helping Iran Build the BombAfter all, we are volunteering to help defend the nuclear weapons program Iran
Helping Iran Build the Bomb
The Intelligencer and Wheeling News-Register / Posted 18 days ago
After all, we are volunteering to help defend the nuclear weapons program Iran claims it doesn't have against those who would delay or cripple it. A normal reaction to that would be "Huh?" But read the proposed agreement among Iran, the United... Read more
20d
Ars Technica
Attackers actively exploit Windows bug that uses USB sticks to infect PCsAttackers are actively exploiting a vulnerability in all supported versions of
Attackers actively exploit Windows bug that uses USB sticks to infect PCs
Ars Technica / Posted 20 days ago
Attackers are actively exploiting a vulnerability in all supported versions of Windows that allows them to execute malicious code when targets mount a booby-trapped USB on their computers, Microsoft warned Tuesday in a regularly scheduled bulletin... Read more
20d
The New Yorker
Having Fun at Camp N.S.A.!As campers around the country sleep under the stars and dive into mountain lake
Having Fun at Camp N.S.A.!
The New Yorker / Posted 20 days ago
As campers around the country sleep under the stars and dive into mountain lakes, 1,400 youths have packed their overnight bags or lunchboxes for a very different experience. They are attending dozens of free overnight and day camps across the... Read more
22d
AllAfrica.com
New Malware Turns Your Computer Into a Cellular AntennaA group of Israeli researchers have improved on a way to steal data from air-ga
New Malware Turns Your Computer Into a Cellular Antenna
AllAfrica.com / Posted 22 days ago
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet. They've figured out how to turn the computer into a cellular transmitter,... Read more
22d
Computer World Australia
New malware turns your computer into a cellular antennaA group of Israeli researchers have improved on a way to steal data from air-ga
New malware turns your computer into a cellular antenna
Computer World Australia / Posted 22 days ago
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet. They've figured out how to turn the computer into a cellular transmitter,... Read more
23d
Op-Ed News
Make deal not war!: Obama's, and DC's, Absurd Choice of a Nuclear Deal or War on IranBy Dave Lindorff I don't know which is worse: President Obama asserting, in de
Make deal not war!: Obama's, and DC's, Absurd Choice of a Nuclear Deal or War on Iran
Op-Ed News / Posted 23 days ago
By Dave Lindorff I don't know which is worse: President Obama asserting, in defense of the nuclear deal he and his Secretary of State John Kerry negotiated with Iran, that "The choice we face is ultimately between diplomacy and some form of war,... Read more
24d
iTWire
Black Hat Conference 2015 – “Today is a good day to hack”I wish I had attended the conference because it has generated at least a dozen
Black Hat Conference 2015 – “Today is a good day to hack”
iTWire / Posted 24 days ago
I wish I had attended the conference because it has generated at least a dozen incredible headlines that should worry us all – and that is on a good day. Black Hat is really a misnomer – it is all about some 9000 white hat hackers coming together to... Read more
24d
World Tribune
Defense minister hints Israel may have been behind killings of Iran nuclear scientists Defense Minister Moshe Ya’alon indicated on Aug. 7 that Israeli intelligence
Defense minister hints Israel may have been behind killings of Iran nuclear scientists
World Tribune / Posted 24 days ago
Defense Minister Moshe Ya’alon indicated on Aug. 7 that Israeli intelligence services may have been behind the assassinations of Iranian nuclear... Read more
4 related stories
25d
PC Advisor
New malware turns your computer into a cellular antennaA group of Israeli researchers have improved on a way to steal data from air-ga
New malware turns your computer into a cellular antenna
PC Advisor / Posted 25 days ago
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet. They've figured out how to turn the computer into a cellular transmitter,... Read more
25d
PC Magazine
Hacker Turns Secure Computers Into Secret-Spewing RadiosLAS VEGAS—modern technology relies on electricity for everything. But a researc
Hacker Turns Secure Computers Into Secret-Spewing Radios
PC Magazine / Posted 25 days ago
LAS VEGAS—modern technology relies on electricity for everything. But a researcher at Black Hat 2015 demonstrated how to turn electronic devices into secret radio transmitters, thanks to physics. Ang Cui of Red Balloon security is the first to admit... Read more
26d
The Jewish Journal of Greater Los Angeles
What can Iran hide in 24 days?Congress has until mid to late September to decide whether to reject or approve
What can Iran hide in 24 days?
The Jewish Journal of Greater Los Angeles / Posted 26 days ago
Congress has until mid to late September to decide whether to reject or approve the nuclear restrictions for the sanctions rollback deal reached by Iran and six major powers on July 14. Some of the debate is over the meaning of certain provisions in... Read more
27d
Op-Ed News
China's Cyberspying Is "on a Scale No One Imagined" -- if You Pretend NSA Doesn't ExistStories about cyberespionage -- like the data theft at the US Office of Persona
China's Cyberspying Is "on a Scale No One Imagined" -- if You Pretend NSA Doesn't Exist
Op-Ed News / Posted 27 days ago
Stories about cyberespionage -- like the data theft at the US Office of Personal Management believed but not officially stated to have been carried out by China -- are weird. For one thing, they include quotes about how "we need to be a bit more... Read more
28d
Computer Weekly
Securing the Internet of Things - time for another look at Public Key Infrastructure (PKI)?The Internet of Things (IoT) is a broad area that is attracting much discussion
Securing the Internet of Things - time for another look at Public Key Infrastructure (PKI)?
Computer Weekly / Posted 28 days ago
The Internet of Things (IoT) is a broad area that is attracting much discussion. Wikipedia starts its IoT definition as follows: 'the network of physical objects or "things" embedded with electronics, software, sensors, and connectivity to enable... Read more
28d
Computer Business Review
5 most vicious cyberattacks on global governmentsAfter a hack on the German federal prosecutor's office, we review other damagin
5 most vicious cyberattacks on global governments
Computer Business Review / Posted 28 days ago
After a hack on the German federal prosecutor's office, we review other damaging hits. A cyberattack on the German federal prosecutor's office last week is only the latest incident of hacking against governments and public bodies from around the... Read more
29d
Perth Now
Why you’re not safe from hackersIf you thought computer data was all that hackers were after, you are very wron
Why you’re not safe from hackers
Perth Now / Posted 29 days ago
If you thought computer data was all that hackers were after, you are very wrong. Hackers are not just after your computer: connected devices from cars to home security systems are now targets for those looking to steal or cause mischief. The rapid... Read more
40 related stories
29d
Daily Telegraph
Why you’re not safe from hackersIf you thought computer data was all that hackers were after, you are very wron
Why you’re not safe from hackers
Daily Telegraph / Posted 29 days ago
If you thought computer data was all that hackers were after, you are very wrong. Hackers are not just after your computer: connected devices from cars to home security systems are now targets for those looking to steal or cause mischief. The rapid... Read more
40 related stories
29d
Adelaide Now
Why you’re not safe from hackersHackers are not just after your computer: connected devices from cars to home s
Why you’re not safe from hackers
Adelaide Now / Posted 29 days ago
Hackers are not just after your computer: connected devices from cars to home security systems are now targets for those looking to steal or cause mischief. The rapid growth in the `internet of things’ has opened up new opportunities for cyber... Read more
40 related stories
29d
Herald Sun
Why you’re not safe from hackersHackers are not just after your computer: connected devices from cars to home s
Why you’re not safe from hackers
Herald Sun / Posted 29 days ago
Hackers are not just after your computer: connected devices from cars to home security systems are now targets for those looking to steal or cause mischief. The rapid growth in the `internet of things’ has opened up new opportunities for cyber... Read more
40 related stories
29d
News.com.au
Why you’re not safe from hackersThe `internet of things’ has opened up new opportunities for cyber attacks If
Why you’re not safe from hackers
News.com.au / Posted 29 days ago
The `internet of things’ has opened up new opportunities for cyber attacks If you thought computer data was all that hackers were after, you are very wrong. Source: AP Hackers are not just after your computer: connected devices from cars to home... Read more
40 related stories
29d
The Courier Mail
Smart gadgets ripe for hacking Hackers are not just after your computer: connected devices from cars to home
Smart gadgets ripe for hacking
The Courier Mail / Posted 29 days ago
Hackers are not just after your computer: connected devices from cars to home security systems are now targets for those looking to steal or cause mischief. The rapid growth in the `internet of things' has opened up... Read more
40 related stories
More

People in this news