Archive for the 'Infrastructure' Category

« Previous PageNext Page »

Several Pentagon Contractors Recruiting for Offensive Cyberwarfare Jobs

June 16th, 2012

Via: Forbes: Over the past few months, Hypponen has been periodically visiting the “careers” section of defense contractors’ websites and online job listings, particularly those targeted at candidates with secret clearances, and searching for words like “exploit,” “offensive,” and “vulnerability.” And the positions he’s been seeing show a new recruiting focus–or newly explicit focus–among the […]

Flame and Stuxnet Share Common Origin

June 12th, 2012

Via: Threat Post: Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin. Researchers from Kaspersky Lab say that a critical module that the Flame worm used to spread is identical to a […]

Cryptanalist Discovers New MD5 Attack Variant in Flame

June 7th, 2012

Via: CWI: Using our forensic tool, we have indeed verified that a chosen-prefix collision attack against MD5 has been used for Flame. More interestingly, the results have shown that not our published chosen-prefix collision attack was used, but an entirely new and unknown variant. Therefore it is not unreasonable to assume that the particular chosen-prefix […]

Japan: Millions of Tons of Radioactive Rubble

June 5th, 2012

Via: The Atlantic: Disposing the more than 20 million tons of rubble caused by the March 11 earthquake and tsunami is proving to be a difficult problem for Japan, not least because much of the rubble has been irradiated by the Fukushima nuclear disaster. The government’s plan — to destroy 4 million tons of potentially […]

Microsoft Update and The Nightmare Scenario

June 5th, 2012

Via: F Secure: About 900 million Windows computers get their updates from Microsoft Update. In addition to the DNS root servers, this update system has always been considered one of the weak points of the net. Antivirus people have nightmares about a variant of malware spoofing the update mechanism and replicating via it. Turns out, […]

Flame ‘Could only have been written by a large team of highly skilled software engineers’

June 2nd, 2012

Via: Ars Technica: At least 20 modules available for the malware bring a menu of highly advanced spying capabilities to the unknown people who control it. One plugin turns on the internal microphone of infected machines so Skype conversations can be secretly monitored in real time. A separate module scans nearby Bluetooth-enabled devices for names […]

U.S. and Israel Created Stuxnet, Lost Control of It

June 1st, 2012

Via: Ars Technica: In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as […]

Tepco Admits Fukushima Disaster Released 2.5 Times More Radiation Than Indicated by Initial Government Lies

May 29th, 2012

Imagine my shock. But if they’re admitting this, what is the real number? Via: Reuters: The radiation released in the first days of the Fukushima nuclear disaster was almost 2-1/2 times the amount first estimated by Japanese safety regulators, the operator of the crippled plant said in a report released on Thursday. Tokyo Electric Power […]

Naoto Kan, Japan’s Former Leader, Condemns Nuclear Power

May 29th, 2012

Via: New York Times: In an unusually stark warning, Japan’s prime minister during last year’s nuclear crisis told a parliamentary inquiry on Monday that the country should discard nuclear power as too dangerous, saying the Fukushima accident had pushed Japan to the brink of “national collapse.” … He said he feared additional meltdowns could “release […]

Made in China: Backdoor Found in Chip Used by U.S. Military

May 29th, 2012

Via: Information Age: A microchip used by the US military and manufactured in China contains a secret “backdoor” that means it can be shut off or reprogrammed without the user knowing, according to researchers at Cambridge University’s Computing Laboratory. The unnamed chip, which the researchers claim is widely used in military and industrial applications, is […]

« Previous PageNext Page »