background preloader

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz in central Iran, when they realized that something was off within the cascade rooms where thousands of centrifuges were enriching uranium. Natanz technicians in white lab coats, gloves and blue booties were scurrying in and out of the “clean” cascade rooms, hauling out unwieldy centrifuges one by one, each sheathed in shiny silver cylindrical casings. Any time workers at the plant decommissioned damaged or otherwise unusable centrifuges, they were required to line them up for IAEA inspection to verify that no radioactive material was being smuggled out in the devices before they were removed. The technicians had been doing so now for more than a month. "We were not immune to the fact that there was a bigger geopolitical picture going on. The question was, why? Click to Open Overlay Gallery Jon Snyder/Wired The clock was ticking. Related:  Stuxnet Developers

Threat Level's Kim Zetter Writing the Book on Stuxnet | Threat Level Wired senior staff writer Kim Zetter won a feature writing award from the Society for Professional Journalists of Northern California last week for her riveting story on how researchers discovered and dissected Stuxnet, a worm intricately programmed to wreak havoc on an Iranian nuclear facility. And in a bit of nice timing, Zetter has officially committed to writing a book, tentatively titled Countdown To Zero Day, expanding on the tale. The book will investigate the implications of what is considered to be the first known virus intended to destroy critical infrastructure and the first shot fired in a new era of digital warfare. The book will be published by Crown (a division of Random House). No publication date has been announced yet. Here’s a taste of the award-winning story: Read the full story from July, and for a follow-up, see Zetter’s story this week on the recent discovery of a mysterious successor to Stuxnet, called DuQu. SPJ NorCal announcement.

Why Our Monkey Brains Are Prone to Procrastination (No, It's Not Just Laziness or Lack Of Willpower) | Personal Health July 4, 2011 | Like this article? Join our email list: Stay up to date with the latest headlines via email. The Misconception: You procrastinate because you are lazy and can’t manage your time well. The Truth: Procrastination is fueled by weakness in the face of impulse and a failure to think about thinking. Netflix reveals something about your own behavior you should have noticed by now, something which keeps getting between you and the things you want to accomplish. If you have Netflix, especially if you stream it to your TV, you tend to gradually accumulate a cache of hundreds of films you think you’ll watch one day. Take a look at your queue. Psychologists actually know the answer to this question, to why you keep adding movies you will never watch to your growing collection of future rentals, and its the same reason you believe you will eventually do what’s best for yourself in all the other parts of your life, but rarely do. After picking, the subjects had to watch one movie right away.

What is a Computer Virus? A Computer Virus is a relatively small software program that is attached to another larger program for the purpose of gaining access to information or to corrupt information within a computer system. Some computer viruses may be relatively harmless. For example, some of them just cause a certain message to pop up on a user's computer screen. Other viruses can be deadly to the computers they infect, erasing information and hard drives, stealing data, and slowing down the entire computer system. Like other software programs, someone must create and write a computer virus; once they are created, viruses can multiply rapidly and spread themselves from computer to computer. Computer Virus Definition & Characteristics: A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. A computer virus needs another program in order to be able to be activated and infect other computers files. A Brief History of Computer Viruses:

Albert Spaggiari Albert Spaggiari (December 14, 1932 – June 8, 1989), nicknamed Bert, was a French criminal chiefly known as the organizer of a break-in into a Société Générale bank in Nice, France in 1976. Earlier life[edit] Spaggiari was born in Laragne-Montéglin in the Hautes-Alpes département. He grew up in Hyères, where his mother had a lingerie store. Spaggiari is reported to have committed his first robbery in order to offer a diamond to a girlfriend. Perhaps as part of a deal made with the authorities, he would later join a paratroop regiment during the Indochina War. During the Algerian War he worked for the Organisation de l'armée secrète (OAS), a clandestine anti-de Gaulle and anti-decolonisation organization. In 1976 he was the owner of a photographic studio in Nice, living in a house in the hills over Nice named Les Oies Sauvages. Heist[edit] When Spaggiari heard that the sewers were close to the vault of the Société Générale bank, he began to plan a break-in into the bank. Works[edit]

The Chinese Way of Hacking Cyberwarfare in 2011 is an odd beast. Many Western governments reportedly actively monitor rivals and engage in online sabotage, while countries ranging from Israel to Iran to India also engage in cyberwarfare programs of their own. But it's attacks against the American government and commercial websites such as Google that grab headlines. As foreign governments learn the ease of obtaining intelligence online and foreign corporations continue to get the edge on their competitors through massive online attacks, future hacker efforts will only become more ambitious. Fast Company recently spoke with Adam Segal, the Ira A. FAST COMPANY: Could you give a short rundown of China's suspected role in cyberespionage of both governments and corporations? ADAM SEGAL: A number of fairly well-publicized attacks on U.S. governments and corporate interests with codenames like “Titan Rain” have taken place. Well, that's the $64,000 question in the Chinese context. Yes.

Still Unknown How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “? 4.

Computer virus Computer viruses currently cause billions of dollars worth of economic damage each year,[14] due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and a multi-billion dollar industry of antivirus software vendors has cropped up, selling virus protection to users of various operating systems of which Windows is often the most victimized, partially due to its extreme popularity.[citation needed] No currently existing antivirus software is able to catch all computer viruses (especially new ones); computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.[15] Vulnerabilities and infection vectors[edit] Software bugs[edit] Social engineering and poor security practices[edit] Vulnerability of different operating systems to viruses[edit]

m.e.driscoll: data utopian • eight golden rules of interface design As we dedicate an increasing fraction of our time interacting with software — from airport check-in terminals and parking meters, to desktop and mobile applications — digital interface design is becoming as important as physical architecture in improving our experience of the world. Here are Professor Ben Schneiderman’s Eight Golden rules for optimally designing that experience (drawn from his classic text, Designing the User Interface): 1 Strive for consistency.Consistent sequences of actions should be required in similar situations; identical terminology should be used in prompts, menus, and help screens; and consistent commands should be employed throughout. 2 Enable frequent users to use shortcuts.As the frequency of use increases, so do the user’s desires to reduce the number of interactions and to increase the pace of interaction. Abbreviations, function keys, hidden commands, and macro facilities are very helpful to an expert user.

Darpa’s New ‘Fast Track’ Okays Hacker Projects in Just Seven Days | Danger Room It’s an open secret: For years, hackers and feds have been strange bedfellows in the mission to defend military networks. Three-letter agencies set up recruiting booths with schwag at security conferences like Black Hat, and feds party it up with the computer nerds at the so-called “underground hacking conference” DefCon after enlisting intelligence help. Darpa, with the help of former hacker Peiter “Mudge” Zatko, wants to find a way for the government make that alliance even easier. With an eye on hacker-minded researchers who operate on small budgets and in their free time, Darpa is awarding small, short-term contracts to those who have a knack for discovering holes in network defenses. It’ll harness some of the creativity brewing at hacker-conferences and experimental hacker-spaces — which, incidentally, already underpin some of the multi-million, multi-year defense contracts being inked. The program is called Cyber Fast Track. That’s jargon for network defense.