jump to navigation

New Super Worm Attacks Infrastructure September 25, 2010

Posted by tkcollier in Technology.
Tags: , , , ,
add a comment

Stuxnet works by exploiting previously unknown security holes in Microsoft’s Windows operating system. It then seeks out a component called Simatic WinCC, manufactured by Siemens, which controls critical factory operations. The malware even uses a stolen cryptographic key belonging to the Taiwanese semiconductor manufacturer RealTek to validate itself in high-security factory systems.

The worm then takes over the computer running the factory process – which for WinCC would be “mission-critical” systems which have to keep functioning under any circumstance – and “blocks” it for up to a tenth of a second. For high-speed systems, such as the centrifuges used for nuclear fuel processing being done by Iran, that could be disastrous, experts suggested.

“This is a very sophisticated attack – the first of its kind – and has clearly been developed by a highly skilled group of people intent on gaining access to SCADA [supervisory control and data acquisition] systems – industrial control systems for monitoring and managing industrial infrastructure or facility-based processes. In contrast to the bulk of indiscriminate cybercrime threats on the internet, this has been aimed at very specific targets. It’s different also because there’s no obvious financial motivation behind the attack – rather the aim seems to be to sabotage systems.”

via Stuxnet worm is the ‘work of a national government agency’ | Technology | guardian.co.uk.

Learn About SpyWare March 9, 2008

Posted by tkcollier in Science & Technology.
Tags: , , , ,
add a comment

Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites

This is one of the best sources for protecting yourself on the Net. It’s not Viruses so much nowadays, but these more insidious forms of Malware. Some of it comes disguised as protection! Here is a list of bogus ones and further down the page a list of good ones. Many are free. There is also a list of removal tools, if it is already too late.

It is a good idea to run 2 of these catch the ones that get missed, as this is a constantly changing battlefield. Choose your weapons carefully. I use Spybot. The new version updates automatically and tries to defend you. But, I also run Super Anti Spyware. While you have to manually Update it, it finds more hidden bad guys and does a better job of removing them.

%d bloggers like this: