![]() |
|
Technology Computing, programming, science, electronics, telecommunications, etc. |
![]() |
|
Thread Tools
![]() |
Display Modes
![]() |
![]() |
#46 |
The future is unwritten
Join Date: Oct 2002
Posts: 71,105
|
These new profesional viruses are from Kaspersky. They're spreading them around so they can find them and build street creds.
![]()
__________________
The descent of man ~ Nixon, Friedman, Reagan, Trump. |
![]() |
![]() |
![]() |
#47 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Here is a fascinating l-o-n-g article about the reverse-engineering
of the malware known as Flame, which was designed to attack the Iranian nuclear site computers. I won't spoil it for laymen/geeks that want to read it for themselves. But this article is almost enough for someone to make a movie of the story --- even though the denouement is not quite finished. Wired Kim Zetter 0/17/12 Coders Behind the Flame Malware Left Digital Clues on Control Servers Quote:
|
|
![]() |
![]() |
![]() |
#48 |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
The "what" of Stuxnet has been widely described and discussed.
But the "who" was not known, even though many suspected Israel. ... Now the U.S. (NSA) and Israel are being publicly identified. Washington Post Greg Miller and Sari Horwitz 6/27/13 Justice Dept. targets general in leak probe A retired four-star Marine Corps general who served as the nation’s second-ranking military officer is a target of a Justice Department investigation into a leak of information about a covert U.S.-Israeli cyberattack on Iran’s nuclear program, a senior Obama administration official said. Retired Gen. James E. “Hoss” Cartwright served as deputy chairman of the Joint Chiefs of Staff and was part of President Obama’s inner circle on a range of critical national security issues before he retired in 2011. <snip> Stuxnet was part of a broader cyber campaign called Olympic Games that was disclosed by the New York Times last year as one of the first major efforts by the United States to use computer code as a destructive weapon against a key adversary. The investigation into the Stuxnet leak was launched in June 2012 by Attorney General Eric H. Holder Jr. and gained momentum in recent months amid indications that prosecutors were putting pressure on a range of current and former senior officials suspected of involvement. The leaks surrounding Stuxnet exposed details about what had been one of the most closely held secrets in the U.S. intelligence community, an ambitious effort by the National Security Agency in collaboration with the Israeli government to devise computer code that could cripple Iran’s alleged effort to pursue a nuclear bomb. |
![]() |
![]() |
![]() |
#49 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
I have been fascinated by the concept of the Stuxnet attacks
... "the malware programs thought to have been jointly developed by the U.S. and Israel that targeted the Iranian nuclear program, but quickly made its way into the digital wild". I've often thought this could become a great movie genre, but so far there has not been a lot of public information. That is changing. This article in the Washington Post has links to all sorts of information, starting at the U.S. group called "Technical Access Operations" Washington Post Andrea Peterson 8/29/13 The NSA has its own team of elite hackers Quote:
|
|
![]() |
![]() |
![]() |
#50 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Stuxnet is now being attributed to the NSA.
And NSA doesn't need the internet ISP's because it's not just hacking the software. This hardware works even when the computer is "turned off". NY Times DAVID E. SANGER and THOM SHANKER JAN. 14, 2014 N.S.A. Devises Radio Pathway Into Computers Quote:
The ![]() ![]() ![]() |
|
![]() |
![]() |
![]() |
#51 |
™
Join Date: Jul 2003
Location: Arlington, VA
Posts: 27,717
|
So how did they get those circuit boards into those computers?
At the manufacturer? Or a cat burglar type black ops nerd rappelling down through a skylight and sneaking past all the laser beam alarm systems with his toolbox of torx wrenches and grounding wrist straps? |
![]() |
![]() |
![]() |
#52 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Quote:
As I understand these things, once you set up receiving on your tv, you can turn off your (controlling) computer ... the tv-show continues. |
|
![]() |
![]() |
![]() |
#53 |
Part-time superhero (off shift right now, leave a message)
Join Date: Dec 2013
Location: Her Majesty's United Kingdom of Great Britain and Northern Ireland
Posts: 211
|
http://www.bbc.co.uk/news/technology-25780908
even domestic appliances are getting in on the act now. fridges sending spam, FFS, what next?
__________________
The only dumb question is the one you didn't ask. |
![]() |
![]() |
![]() |
#54 |
The future is unwritten
Join Date: Oct 2002
Posts: 71,105
|
This rush to be able to control everything you own/rent, car, thermostat, lights, appliances, baby monitor, security, from your phone, is 50% for convenience, 50% for look-what-I-got.
Stop, drop, roll, think. If you can do it, someone else can do it. Do you want to trade your safety/security for the gee-whiz-factor, or the I-forgot-but-I-can-do-it-from-here?
__________________
The descent of man ~ Nixon, Friedman, Reagan, Trump. |
![]() |
![]() |
![]() |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|