[prev in list] [next in list] [prev in thread] [next in thread]
List: isn
Subject: [ISN] How Stuxnet Came Back to Haunt the U.S.
From: InfoSec News <alerts () infosecnews ! org>
Date: 2012-05-18 10:14:31
Message-ID: alpine.DEB.2.02.1205180514140.11840 () infosecnews ! org
[Download RAW message or body]
http://www.theatlanticwire.com/technology/2012/05/how-stuxnet-came-back-haunt-us/52466/
By Megha Rajagopalan
ProPublica
May 17, 2012
Last week, the Department of Homeland Security revealed a rash of cyber
attacks on natural gas pipeline companies. Just as with previous cyber
attacks on infrastructure, there was no known physical damage. But
security experts worry it may only be a matter of time.
Efforts to protect pipelines and other critical systems have been
halting despite broad agreement that they're vulnerable to viruses like
Stuxnet 2014 the mysterious worm that caused havoc to Iran's nuclear
program two years ago.
The Frankenstein-like virus infected a type of industrial controller
that is ubiquitous 2014 used around the world on everything from
pipelines to the electric grid.
Experts say manufacturers haven't fixed security flaws in these
essential but obscure devices.
Why hasn't more been done? Here's why Stuxnet remains a top national
security risk.
[...]
_______________________________________________
LayerOne Security Conference
May 26-27, Clarion Hotel, Anaheim, CA
http://www.layerone.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic