computer expert believes that Stuxnet was created as a weapon for cyber warfare Iran
Ralph Langner, a recognized expert in industrial security systems, has released the results of a study on the worm Stuxnet, which says there is a strong possibility that a nation has created the worm to attack an Iranian nuclear power plant. Langner Friday, December 3, 2010
Kate Nash Piano Sheets
He speculated that the target of the worm is the Bushehr nuclear plant in Iran, working with el programa de Siemens afectado. Langner sospecha que los problemas técnicos que sufrió la planta el año pasado fueron causados por el gusano Stuxnet. Además, el experto sospecha que la gran cantidad de infecciones que tiene este país son porque los atacantes quieren llegar a esta planta.
El experto comparte las sospechas de que el gusano es demasiado sofisticado como para que haya sido creado por un pirata informático común y corriente: “este no es un simple pirata sentado en el sótano de la casa de sus padres. Yo creo que sólo una nación tiene suficientes recursos como para organizar este ataque”.
Entre los principales sospechosos de haber desarrollado el gusano se encuentran Estados Unidos and Israel, according to Langner are two nations with more resources and motivation to attack Iran's nuclear plants.
"The attack combines an amazing amount of technical knowledge: just think of the number of unknown vulnerabilities exploited, stolen certificates, etc. This could only have been composed by a highly qualified team of experts, some with experience in control of specific systems. "
Langner's study found that Stuxnet is not spyware, but a program designed to launch attacks to destroy and cause physical damage to systems with very specific settings Siemens.
"The problem is not Stuxnet. Stuxnet is history, "Langner said," The problem is the new generation of malware to come. " Langner
present the results of their study in a private conference in Maryland, to be attended by experts from Siemens.
El experto comparte las sospechas de que el gusano es demasiado sofisticado como para que haya sido creado por un pirata informático común y corriente: “este no es un simple pirata sentado en el sótano de la casa de sus padres. Yo creo que sólo una nación tiene suficientes recursos como para organizar este ataque”.
Entre los principales sospechosos de haber desarrollado el gusano se encuentran Estados Unidos and Israel, according to Langner are two nations with more resources and motivation to attack Iran's nuclear plants.
"The attack combines an amazing amount of technical knowledge: just think of the number of unknown vulnerabilities exploited, stolen certificates, etc. This could only have been composed by a highly qualified team of experts, some with experience in control of specific systems. "
Langner's study found that Stuxnet is not spyware, but a program designed to launch attacks to destroy and cause physical damage to systems with very specific settings Siemens.
"The problem is not Stuxnet. Stuxnet is history, "Langner said," The problem is the new generation of malware to come. " Langner
present the results of their study in a private conference in Maryland, to be attended by experts from Siemens.
Wednesday, December 1, 2010
Recorded Size Of Clitoris
Adobe patches critical vulnerability in Flash Player
Adobe has advanced the launch of an emergency patch to fix a vulnerability in Adobe Flash Player that criminals had already begun to exploit the Internet.
Adobe has advanced the launch of an emergency patch to fix a vulnerability in Adobe Flash Player that criminals had already begun to exploit the Internet.
Adobe had planned to release the update next week, but finished ahead of schedule developed and made available to the public on Monday.
The vulnerability, rated as critical, can make the system collapse or malicious users to control it completely. The vulnerability affects versions of Adobe Flash Player 10.1.82.76 and earlier, and the patch protects users of Windows, Macintosh, Linux, Solaris and Android in danger, although so far only been detected attacks Windows users .
The problem also affects Adobe Reader 9.3.4 and earlier versions for Windows and Mac
Although the release of this update is a breakthrough, Adobe still has control of a vulnerability in Acrobat and Reader that was detected a week Last to close this vulnerability completely.
The company has advanced to try to release the patch for this issue the week of Oct. 4.
Inurl:/view/shtml Hose
The leader of a group of cyber criminals who attacked RBS Worldpay will not go to prison
A Russian judge has ruled that Victor sent to prison Pleshchuk, a leader of a group of virtual criminals who organized and launched a sophisticated attack on RBS WorldPay, the payment processor to the Bank of Scotland .
A Russian judge has ruled that Victor sent to prison Pleshchuk, a leader of a group of virtual criminals who organized and launched a sophisticated attack on RBS WorldPay, the payment processor to the Bank of Scotland .
Pleushchuk The court sentenced 28-year, six-year suspended sentence and pay restitution of $ 8.9 million to RBS WorldPay.
In November 2008, the group led by cybercriminals Pleushchuk entered the RBS Worldpay system and stole the financial data of users in real time, while the processing system. The attackers used these data to clone credit cards 44 which increased the balance in order to withdraw more money.
The attack was so well coordinated that in just 12 hours a group of accomplices in Ukraine, Italy, Hong Kong, Japan, 280 cities in the United States, etc.. emptied their victims' accounts from 2,100 ATMs worldwide. The criminal ring obtained more than $ 9.4 million.
Russian police arrested and began estonia criminal proceedings against seven others who participated in the attack, including Sergei Tsurikov, one of the leaders in November he was extradited for trial in the United States.
Pleshchuk admitted that he participated in the attack but said he had no bad intentions. "This is not any kind of crime, cybercrime, and Pleshchuk not fully understand the damage he was causing."
Minnie Mouse Printouts
Microsoft wins a legal battle
A U.S. court has granted Microsoft the permanent control of 276 Internet domains Waledac botnet used to send instructions to their computers compromised.
The victory began in February, when the judge accepted the nearly 300 domains off temporarily to decide who would control them. Microsoft says that since then Waledac activity has stalled.
Microsoft's request was risky because it had been identified by cybercriminals botnet, so the accused could not defend against the allegations, a very important duty to ensure that the legal process is fair .
Still, the judge ruled that Microsoft would be appropriate to make permanent the new owner of the domain, including pages . Com,. Net,. Biz and. Org.
But to win the war against Waledac, Microsoft should work with Internet providers and security groups to notify owners of the 58,000 compromised systems and help them get rid of the infection.
Microsoft does not believe that the defense issue any appeal, but says that criminals have already shown their displeasure as best they know how: by launching denial of service attacks to his legal team.
Subscribe to:
Posts (Atom)