Blog Posts Tagged with "Iran"


Will the Next Stuxnet be a Russian - Iranian Creation?

June 18, 2012 Added by:Dan Dieterle

Russia has very advanced cyber capabilities, and they have shared military hardware and tech with middle east nations before. It is not a big leap to think that they could and would share cyber warfare technology with these nations, especially if they rely on these nations for energy reserve...

Comments  (0)


Iran Fingers US Hackers in Oil Ministry Attacks

June 12, 2012 Added by:Headlines

"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."

Comments  (0)


Cybergate: Stuxnet and Flame are Related

June 11, 2012 Added by:Joel Harding

Contrary to previous reports that Stuxnet and Flame were unrelated, the authors apparently worked together at one point. If this is the case we might begin looking for evidence of more code from Operation Olympic Games floating around. Flame provides a framework for future warfare in cyberspace...

Comments  (0)


Is this the Official Beginning of a Cyberwar on the Internet?

June 06, 2012 Added by:Lee Munson

Even though we came close to a confirmation with the Stuxnet attack, can you really say that it is the beginning of a cyber war? All we can really say now is that it is the escalation of one that has already been ongoing. It is assumed that we are in the middle of a cyber war already...

Comments  (0)


FBI Opens Investigation into Stuxnet Attack Leaks

June 06, 2012 Added by:Headlines

The FBI is probing the source of recently leaked information regarding covert cyber operations conducted by the U.S. government, particularly the Stuxnet attacks. Stuxnet is largely considered to be a game changer because the virus affected kinetic damage on equipment the targeted systems controlled...

Comments  (0)


Stuxnet: Tsunami of Stupid or Evil Genius?

June 01, 2012 Added by:Ali-Reza Anghaie

We just compounded ugly. Weaponizing Cyberspace is a losing proposition across the board but it's still going to happen. I was just hoping we'd cut it a bit short and realize the errors - this NYT piece makes me feel like we don't have enough depth in DC to realize the risks before it's too late...

Comments  (7)


Flame Malware: From Genesis to the Conspiracy Theory

May 31, 2012 Added by:Plagiarist Paganini

Some antivirus providers were ready with a fix for Flame. This information, together with evidence that the malware dates to at least 2010, would lead me to believe that the major security companies were aware of Flame and have been silent because of agreements with Western governments...

Comments  (2)


Flame: Implications vs. Speculation

May 30, 2012 Added by:Robert M. Lee

Attribution is incredibly hard to apply in the cyber domain, and even the most appealing pieces of evidence can be purposely misleading. The perception of attribution applied to a nation-state cyber attack can put tension on nation-state relationships, have an effect on deterrence, and cause real-world issues...

Comments  (0)


Flame: Another Holiday, Another Super Virus

May 29, 2012 Added by:Kevin McAleavey

Flame is huge - 20 modules and 20 megabytes. Strange that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years. The worm runs as a Windows service, and most of the files are visible, making this even more of a surprise...

Comments  (1)


Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)


Iranian Hackers Hit NASA: Isolated Attack or Act of Cyberwar?

May 24, 2012 Added by:Plagiarist Paganini

Hackers have written an HTTPS protocol scanner to find weaknesses in the NASA website. A NASA spokesman hasn't denied the hack, and the agency is investigating the event. Is it an isolated operation conducted by a group of hackers, or a state-sponsored act of cyberwar?

Comments  (0)


FBI: Al-Qaeda Video Calls for Electronic Jihad against the US

May 24, 2012 Added by:Dan Dieterle

A 6 minute Al Qaeda video translated by the FBI calls for extremist followers to perform cyber attacks against the US. The video states that US computer systems are as vulnerable to electronic warfare as airline security was leading up to the 9/11 attacks...

Comments  (0)


Did Iran Recover Encrypted Data from Downed Stealth Drone?

May 02, 2012 Added by:Dan Dieterle

Iranian officials recently released claims that they have finished their reverse engineering of the downed US stealth drone and will begin to make a copy. The Iranians released information they say was encrypted flight and maintenance data from internal databases...

Comments  (0)


Iran vs. The West: Cyberwar or Media Hype?

April 27, 2012 Added by:Plagiarist Paganini

The growing tension between Iran, the U.S. and Israel does not bode well, however the reports persistently circulated on the Internet don't add anything new to a scenario that has long been known. Iran has long understood how strategic a strong presence in cyber space is...

Comments  (0)


House Testimony: Iran Preparing Attacks on U.S. Infrastructure

April 26, 2012 Added by:Headlines

Cybersecurity experts will testify before Congress today on the high probability that the Iranian government is engaged in building a cyber offensive force geared towards attacks against critical U.S. infrastructure targets including power and water distribution facilities...

Comments  (0)


Iranian Double Agents Planted Stuxnet in Nuclear Facilities

April 17, 2012 Added by:Dan Dieterle

“Using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. 'Iranian double agents' would have helped to target the most vulnerable spots in the system...”

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »