[prev in list] [next in list] [prev in thread] [next in thread] 

List:       isn
Subject:    [ISN] How Stuxnet Came Back to Haunt the U.S.
From:       InfoSec News <alerts () infosecnews ! org>
Date:       2012-05-18 10:14:31
Message-ID: alpine.DEB.2.02.1205180514140.11840 () infosecnews ! org
[Download RAW message or body]

http://www.theatlanticwire.com/technology/2012/05/how-stuxnet-came-back-haunt-us/52466/

By Megha Rajagopalan
ProPublica
May 17, 2012

Last week, the Department of Homeland Security revealed a rash of cyber 
attacks on natural gas pipeline companies. Just as with previous cyber 
attacks on infrastructure, there was no known physical damage. But 
security experts worry it may only be a matter of time.

Efforts to protect pipelines and other critical systems have been 
halting despite broad agreement that they're vulnerable to viruses like 
Stuxnet 2014 the mysterious worm that caused havoc to Iran's nuclear 
program two years ago.

The Frankenstein-like virus infected a type of industrial controller 
that is ubiquitous 2014 used around the world on everything from 
pipelines to the electric grid.

Experts say manufacturers haven't fixed security flaws in these 
essential but obscure devices.

Why hasn't more been done? Here's why Stuxnet remains a top national 
security risk.

[...]


_______________________________________________
LayerOne Security Conference
May 26-27, Clarion Hotel, Anaheim, CA
http://www.layerone.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic