![]() |
|
Technology Computing, programming, science, electronics, telecommunications, etc. |
![]() |
|
Thread Tools | Display Modes |
|
![]() |
#1 |
As stable as a ring of PU-239
Join Date: Jun 2004
Location: On a huge rock covered in water, highly advanced moss and 7 billion parasites
Posts: 1,264
|
As much a pain as it can be, it's stuff like this that makes me glad I routinely unplug my webcam, mic and headset when I'm not actively using them.
Not that my computer has anything of interest on it... and anyone spying on me would get mostly me singing and good shots of my more lived-in T-shirts...
__________________
"I don't see what's so triffic about creating people as people and then getting' upset 'cos they act like people." ~Adam Young, Good Omens "I don't see why it matters what is written. Not when it's about people. It can always be crossed out." ~Adam Young, Good Omens |
![]() |
![]() |
![]() |
#2 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
And the beat goes on....
NY Times NICOLE PERLROTH 8/19/12 Virus Seeking Bank Data Is Tied to Attack on Iran Quote:
|
|
![]() |
![]() |
![]() |
#3 |
The future is unwritten
Join Date: Oct 2002
Posts: 71,105
|
These new profesional viruses are from Kaspersky. They're spreading them around so they can find them and build street creds.
![]()
__________________
The descent of man ~ Nixon, Friedman, Reagan, Trump. |
![]() |
![]() |
![]() |
#4 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Here is a fascinating l-o-n-g article about the reverse-engineering
of the malware known as Flame, which was designed to attack the Iranian nuclear site computers. I won't spoil it for laymen/geeks that want to read it for themselves. But this article is almost enough for someone to make a movie of the story --- even though the denouement is not quite finished. Wired Kim Zetter 0/17/12 Coders Behind the Flame Malware Left Digital Clues on Control Servers Quote:
|
|
![]() |
![]() |
![]() |
#5 |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
The "what" of Stuxnet has been widely described and discussed.
But the "who" was not known, even though many suspected Israel. ... Now the U.S. (NSA) and Israel are being publicly identified. Washington Post Greg Miller and Sari Horwitz 6/27/13 Justice Dept. targets general in leak probe A retired four-star Marine Corps general who served as the nation’s second-ranking military officer is a target of a Justice Department investigation into a leak of information about a covert U.S.-Israeli cyberattack on Iran’s nuclear program, a senior Obama administration official said. Retired Gen. James E. “Hoss” Cartwright served as deputy chairman of the Joint Chiefs of Staff and was part of President Obama’s inner circle on a range of critical national security issues before he retired in 2011. <snip> Stuxnet was part of a broader cyber campaign called Olympic Games that was disclosed by the New York Times last year as one of the first major efforts by the United States to use computer code as a destructive weapon against a key adversary. The investigation into the Stuxnet leak was launched in June 2012 by Attorney General Eric H. Holder Jr. and gained momentum in recent months amid indications that prosecutors were putting pressure on a range of current and former senior officials suspected of involvement. The leaks surrounding Stuxnet exposed details about what had been one of the most closely held secrets in the U.S. intelligence community, an ambitious effort by the National Security Agency in collaboration with the Israeli government to devise computer code that could cripple Iran’s alleged effort to pursue a nuclear bomb. |
![]() |
![]() |
![]() |
#6 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
I have been fascinated by the concept of the Stuxnet attacks
... "the malware programs thought to have been jointly developed by the U.S. and Israel that targeted the Iranian nuclear program, but quickly made its way into the digital wild". I've often thought this could become a great movie genre, but so far there has not been a lot of public information. That is changing. This article in the Washington Post has links to all sorts of information, starting at the U.S. group called "Technical Access Operations" Washington Post Andrea Peterson 8/29/13 The NSA has its own team of elite hackers Quote:
|
|
![]() |
![]() |
![]() |
#7 | |
Person who doesn't update the user title
Join Date: Jun 2010
Location: Bottom lands of the Missoula floods
Posts: 6,402
|
Stuxnet is now being attributed to the NSA.
And NSA doesn't need the internet ISP's because it's not just hacking the software. This hardware works even when the computer is "turned off". NY Times DAVID E. SANGER and THOM SHANKER JAN. 14, 2014 N.S.A. Devises Radio Pathway Into Computers Quote:
The ![]() ![]() ![]() |
|
![]() |
![]() |
![]() |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|