Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu.
The US Department of Homeland Security has issued an alert that hackers have released proof of concept exploit code for vulnerabilities in a common SCADA software package used to manage solar energy systems.
Telvent tells customers that it's discovered that attackers breached its internal firewall and security systems, implanted malicious software, and stolen project files linked to its smart grid product. Experts detected digital fingerprints implicating a Chinese hacking group.
Can hackers really cause as much bloodshed as 353 Imperial Japanese Navy fighters, bombers and torpedo planes launched from six aircraft carriers?
Can hackers really kill 2,402 U.S. citizens, leave 1,282 wounded, lose 65 of their own attackers in the process, and plunge the United States into a World War?
The FBI acknowledged hackers have penetrated at least 3 US cities SCADA systems, one of them "major". The FBI is receiving a 12% budget increase for Cyber, but claims the division will double in size this year.
Smoke and fire certainly make good hacking headlines.
But there's a lot more to the flaming war of words between Columbia University and HP than potential pyro printer problems.
Paul Ducklin weighs into the debate.
Paul Ducklin joins Chet to talk about this week's news including giving your friends and family a hand at Thanksgiving, Android security, SCADA hacking and Google's WiFi mapping opt-out scheme.
After writing about the hacking of SCADA systems I was contacted by one of the hackers, pr0f. I interviewed him via email to get his thoughts on how secure our critical infrastructure really is.
An attack that allegedly destroyed a pump at a municipal water processing facility has raised alarms about the security of critical infrastructure in the United States.
Reports have emerged suggesting a new piece of malware derived from Stuxnet has been reused to perform information gathering. Find out what we know and the links to the infamous Stuxnet worm.
Don't just read the latest computer security news - watch it in 90 seconds! This month: when internet access chose the government; Adobe battles another zero-day; Twitter suffers XSS woes; and the Stuxnet malware keeps on making the wrong headlines. Read more…
Thousands of international security experts are congregating in Nevada, USA, for the Black Hat 2010 conference. But why? What is the single biggest issue which the 2010 conference will address? Is it malware? SCADA? Privacy? Cloud? Hear from the experts Read more…