post
  | •Main  |  • Drop Box  |  • Chat   |  • forum  |  • links  |  • Link to Us   |  • Archives  |    |  • Join Forum  |  • Donate  |  • Store  |  • Quick Post   |  

Occasion2b - first place on earth to see tomorrow   
praetorian-frowzy
praetorian-frowzy
praetorian-frowzy
praetorian-frowzy






WAP2



Dot Info


• General Discussion

• Pandemic Flu

•War & Rumor

• Economy Watch

• All Things Prepper

• Site Stream

• Archives

diurnal diurnal




brainpaint at occasion2b
• BrainPaint





Status
Status

The sun Today
Playing on RadioShowlinks.com


Right click and view
for larger image




Welcome, Guest. Please or register. Or not
         ~ Guest posting on ~
September 25, 2010, 10:24:21 AM                                

• View most recent posts.

  * Home Search Calendar Login Register
    
Pages: 1 Print Start new topic
beast
Hero Member
Posts: 6659


WWW
Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?
« September 23, 2010, 12:09:21 AM »
Cyber security experts  say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.

The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.

At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.

The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.

yahoo.com
Reply with quote Reply with quote
Pages: 1 Print Start new topic 
« previous next »
Link to Calendar

Top

back
Powered by SMF 1.1.11 | SMF © 2006-2009, Simple Machines LLC
Twitter Mod created by 2by2host.com - a web hosting company
| Sitemap



praetorian-frowzy
praetorian-frowzy
praetorian-frowzy
praetorian-frowzy