recentpopularlog in

jerryking : computer_viruses   15

Businesses must quickly count the cost of cyber crime
8 July /9 July 2017 | Financial Times | Brooke Masters.

Transparency without the full facts can be dangerous....Cyber attacks are frightening and hard for investors to evaluate. Quantify, to the extent possible, the impact as quickly as you can.
computer_viruses  malware  Mondelez  cyber_security  WPP  transparency  cyberattacks  brands 
august 2017 by jerryking
Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons - The New York Times
By NICOLE PERLROTH and DAVID E. SANGER JUNE 28, 2017

The Petya ransomware attack....was built on cyberweapons (i.e. hacking tools that exploited vulnerabilities in Microsoft software) stolen from the NSA in 2016 by Shadow Brokers and made public in April 2017. Now those weapons are being deployed against various U.S. partners include the United Kingdom and Ukraine.....there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands..... the government “employs a disciplined, high-level interagency decision-making process for disclosure of known vulnerabilities” in software, “unlike any other country in the world.”....Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States.

“Whether it’s North Korea, Russia, China, Iran or ISIS, almost all of the flash points out there now involve a cyber element,” Leon E. Panetta, the former defense secretary and Central Intelligence Agency chief.....viruses can suddenly mutate into other areas you didn’t intend, more and more,” Mr. Panetta said. “That’s the threat we’re going to face in the near future.”..... ransomware that recently gained the most attention in the Ukraine attack is believed to have been a smoke screen for a deeper assault aimed at destroying victims’ computers entirely. .....Mr. Panetta was among the officials warning years ago of a “cyber Pearl Harbor” that could bring down the American power grid. But he and others never imagined that those same enemies might use the N.S.A.’s own cyberweapons.....rogue actors actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,”.....So long as flaws in computer code exist to create openings for digital weapons and spy tools, security experts say, the N.S.A. is not likely to stop hoarding software vulnerabilities any time soon.
adversaries  CIA  computer_viruses  cyberattacks  cyberthreats  cyberweapons  David_Sanger  exploits  hackers  Leon_Panetta  malware  NSA  North_Korea  Pentagon  power_grid  ransomware  rogue_actors  security_&_intelligence  SecDef  vulnerabilities 
june 2017 by jerryking
Cyber-warfare: Turning worm
Dec 13th 2014 || The Economist |

Timekeeper
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. By Kim Zetter. Crown; 433 pages; $25 and £20
computer_viruses  cyber_warfare  Stuxnet  security_&_intelligence  books  malware  software  coding  exploits 
december 2014 by jerryking
Spyware Becomes Increasingly Malicious - WSJ.com
July 12, 2004 | WSJ | By LEE GOMES.

Spyware Is Easy to Get, Difficult to Remove, Increasingly Malicious
computer_viruses  malware  software_bugs 
january 2013 by jerryking
Ottawa set to ban Chinese firm from telecommunications bid - The Globe and Mail
STEVEN CHASE

OTTAWA — The Globe and Mail

Last updated Wednesday, Oct. 10 2012

One presentation, which discusses the damage foreign adversaries can inflict on computer systems, mentions the "Farewell dossier" incident. That was a Cold War episode in which the Central Intelligence Agency was reported to have deliberately transferred faulty technology to the Soviets – including a computer virus that triggered a major pipeline explosion.
computer_viruses  cyber_security  Huawei  adversaries  malware  software_bugs  vulnerabilities 
october 2012 by jerryking
Q&A: Poisoned Pictures on the Web - NYTimes.com
June 7, 2011, 6:57 am
Q&A: Poisoned Pictures on the Web
By J.D. BIERSDORFER
computer_viruses  malware 
june 2011 by jerryking
Most Sophisticated Malware Ever Targets Iran
Sep 22 2010, - The Atlantic Alexis Madrigal . A computer worm
is drawing awed respect and fear from security researchers, even as
they wonder how and why it was created.

Four things about Stuxnet are particularly noteworthy, according to
experts consulted by ComputerWorld. One, it appears to be the most
sophisticated malware anyone has ever seen. Two, because of that,
researchers do not believe it could have been created by a private
group. They think it's the handiwork of a nation-state. Third, it could
control real world machinery, like, say, a power plant. Fourth, it
appears to have targeted Iran.
malware  Iran  cyber_warfare  computer_viruses  Stuxnet  physical_world  cyberphysical  power_grid 
september 2010 by jerryking

Copy this bookmark:





to read