Archive for the 'Infrastructure' Category
TEPCO Admits It Could Have Prevented Fukushima Disaster
October 13th, 2012Via: Epoch Times: TEPCO, the Japanese utility in charge of the Fukushima Daiichi power plant that melted down last year, admitted on Friday that the disaster could have been averted. So why did it fail to act accordingly? Fear. The utility said it could have done more to prevent the earthquake and tsunami-triggered disaster that […]
Major Banks Hit with Biggest Cyberattacks in History
September 27th, 2012Via: CNN: Since Sept. 19, the websites of Bank of America, JPMorgan Chase, Wells Fargo, U.S. Bank and PNC Bank have all suffered day-long slowdowns and been sporadically unreachable for many customers. The attackers, who took aim at Bank of America first, went after their targets in sequence. Thursday’s victim, PNC’s website, was inaccessible at […]
Cyber Clues Link U.S. to New Computer Viruses
September 18th, 2012Via: Reuters: Researchers have found evidence suggesting that the United States may have developed three previously unknown computer viruses for use in espionage operations or cyber warfare. … For now, the two firms know very little about the newly identified viruses, except that one of them is currently deployed in the Middle East. They are […]
‘There are no technological or economic barriers to converting the entire world to clean, renewable energy sources’
September 15th, 2012“Fifteen years ago I thought solar power was impractical because I thought nuclear power was the answer. But I spent some time on an advisory committee on waste disposal to the Atomic Energy Commission. After that, I began to be very, very skeptical because of the hazards. That’s when I began to study solar power. […]
Private Crypto Key in Mission-Critical Hardware
August 23rd, 2012Via: Ars Technica: A private encryption key embedded into widely used mission-critical routers could be exploited by hackers to attack electric substations, railroad switches, and other critical infrastructure, security researchers have warned. The flaw, uncovered in devices made by Siemens subsidiary RuggedCom of Ontario, Canada, is the second this year to affect its Rugged Operating […]
Saudi Arabia’s National Oil Company Kills Network After Cyber Attack
August 16th, 2012Via: Security Week: Saudi Aramco, Saudi Arabia’s national oil company and the largest in the world, has confirmed that is has been hit by a cyber attack that resulted in malware infecting user workstations, but did not affect other parts of its network. “On Wednesday, Aug. 15, 2012, an official at Saudi Aramco confirmed that […]
Kaspersky Asks for Help with Decrypting Gauss Payload
August 14th, 2012Via: Kaspersky Lab – SecureList: There are many remaining mysteries in the Gauss and Flame stories. For instance, how do people get infected with the malware? Or, what is the purpose of the uniquely named “Palida Narrow” font that Gauss installs? Perhaps the most interesting mystery is Gauss’ encrypted warhead. Gauss contains a module named […]
JPMorgan Spends $500 Million per Data Center
August 14th, 2012Via: Data Center Knowledge: JPMorgan Chase spends $500 million to build a data center, according to CEO Jamie Dimon. That figure places the firm’s facilities among the most expensive in the industry, on a par with investments by Google and Microsoft in their largest data centers.
Fukushima Fallout ‘Caused Physiological and Genetic Damage’ to Butterflies
August 13th, 2012Via: Nature: The collapse of the Fukushima Dai-ichi Nuclear Power Plant caused a massive release of radioactive materials to the environment. A prompt and reliable system for evaluating the biological impacts of this accident on animals has not been available. Here we show that the accident caused physiological and genetic damage to the pale grass […]
Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System
August 11th, 2012Via: Public Intelligence: Hacked emails from the private intelligence firm Stratfor have shed light on a global suspicious activity surveillance system called TrapWire that is reportedly in use in locations around the world from the London Stock Exchange to the White House. The emails, which were released yesterday by WikiLeaks, provide information on the extent […]
