http://security.blogs.cnn.com/2012/...iran-is-behind-recent-cyberattacks/?hpt=wo_c2 More and more countries are resorting to cyber attacks going after the computer system of their enemies because most modern military hardware are now computer reliant. I think the next step and probably I am correct that governments are now researching to produce what is the equivalent of nuclear CYBER BOMB or Nuclear Virus!
It looks to me like you and I are on different ends of the political spectrum but on this one we are in complete agreement. We are now so dependent on this technology that we could be in real trouble if vital computer systems were knocked out by an attack. Government and private industry need to pay attention.
Amateur hackers expose Iran in cyberattack... Saudi Cyber Attack Seen as Work of Amateur Hackers Backed by Iran October 25, 2012 WASHINGTON Digital security experts say a major August cyber-attack at Saudi Arabia's top oil company appears to be the work of amateur hackers working on behalf of a nation state, and several signs point to Iran as their sponsor.
Granny says Iran retaliatin' for sanctions... US banks under cyberattack say Iran is a suspect Fri, Jan 11, 2013 - US financial institutions are being pounded with high-powered cyberattacks that some suspect are being orchestrated by Iran as payback for political sanctions.
I would expect that as time goes on you'll see more and more institutions getting off the public internet and onto private intranets. The Y2K kerfuffle supposed that control of the electric power utilities was Internet-based. It wasn't and never was. The industry has worked out it own fiber-optic communication system. Hackers can't get at it because they have no physical connectivity. The DoD does this to a great extent and I'd expect banks to be following close behind. Anybody with a lot to lose can defeat hackers if they can eliminate physical connectivity.
The attack suggests a form of encryption may have been cracked... 'Red October' cyber-attack found by Russian researchers 14 January 2013 : A major cyber-attack that may have been stealing confidential documents since 2007 has been discovered by Russian researchers.
Granny says 900x5=4,500... US Cyber Command in 'fivefold' staff expansion 28 January 2013 - Defence Secretary Panetta warned in November of a "cyber Pearl Harbour"
Obama gonna shut down the internet?... Expect White House cyber security order after State of the Union 1/31/13 Senate Homeland Security and Governmental Affairs Committee Chairman Tom Carper (D-Del.) said the White House has signaled that it will likely introduce its cybersecurity order in the second half of February, following President Obama's State of the Union address.
That still will not stop them. You can still have attacks even within a closed system. Just look at the amount of damage done to the closed Iranian Nuclear program due to Stuxnet, a virus that was most likely introduced through a thumb drive. We have even had similar cases in the DoD computer system (which is why the use of any removeable media is now illegal in DoD computers). And more low-tech, even a disk can be infected, such as the classic Stoned virus. Removal from the Internet is not a fool-proof solution.
I guess that is why that is one reason why the NRA is so aggressive in pushing for Americans the right to bare arms....in the end when all fails and fall part we will all revert back to old fashion warfare.
Granny says, "Dat's right - dem Chinese PLA behind recent cyberattacks... China Weaponizes Cyberspace February 21, 2013 - A damning, 60-page report released by American computer security firm Mandiant reveals that a 12-story building on the outskirts of Shanghai is most likely the epicenter of ongoing cyber attacks perpetrated against a number of American corporations and government agencies, as well as entities such as power grids, gas lines and water works. The building, located in a run-down section of the city, is the headquarters of the Peoples Liberation Army (PLA) Unit 61398. A 2010 report by Mandiant questioned whether the Chinese government was directly involved in such hacking. No longer. The details we have analyzed during hundreds of investigations convince us that the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them, the report states. See also: White House Unveils New Strategy Against Trade Secret Thefts February 20, 2013 The Obama administration has unveiled a new strategy to help protect American companies from economic espionage and thefts of trade secrets, an issue linked to intensified concerns about cyber espionage.
Mebbe dey should call it the PlayStation medal... Pentagon: Drone pilots, cyber warriors might get medals after all March 20, 2014 WASHINGTON During an upcoming review of the militarys decorations and awards system, the Defense Department will reconsider the sensitive issue of whether drone operators and cyber warriors will receive medals for their service.
Already measures are being taken to minimize the effects of cyber attacks. One foolproof defense is an open connection. No connection, no attack. The electric power grid (at least the operations end of it) has been moving toward using a proprietary net with zero connectivity to normal telecom pathways. No doubt with the money they have available, the banks are moving that way, too.
Exactly. The only protection is to be 100% off the Internet, period. Think of Commander Adama and his "No networked systems" policy. Even that is not 100% (think Iran and Stuxnet), but it reduces your exposure to almost nothing.
Viruses and tracers can be programmed into chips as well, so there are are other paths into systems even if not on a network, through hardware supply chains. Your motherboard bios can hold them, as can cpu's themselves, and no virus scanners will find them, only their results will be found.
In theory, never done. And a bit issue of this is that a virus must be written in a language, or an operating system. And it is impossible to predict what operating system is going to be running on a processor. I admit that theoretically it is possible, it is about as unlikely as the virus from Independence Day.