Lockheed network hit by major disruption: sources

Lockheed network hit by major disruption: sources By Andrea Shalal-Esa and Jim Finkle WASHINGTON/BOSTON | Thu May 26, 2011 7:55pm EDT (Reuters) – Lockheed Martin, the Pentagon’s No. 1 supplier, is experiencing a major disruption to its computer systems that could be related to a problem with network security, a defense official and two sources familiar with the issue said […]

Serious hole in critical-infrastructure software, says U.S.

by Elinor Mills The U.S. government is warning critical-infrastructure operators of a serious hole in software used in oil and gas; water; electric utilities; and manufacturing plants around the world. The stack overflow vulnerability affects the Genesis32 supervisory control and data acquisition (SCADA) and BizViz software sold by ICONICS, according to an advisory (PDF) released […]

SCADA hack talk canceled after U.S., Siemens request

by Elinor Mills The researchers were scheduled to give their talk at the TakeDown Conference in Dallas today. Two researchers say they canceled a talk at a security conference today on how to attack critical infrastructure systems, after U.S. cybersecurity and Siemens representatives asked them not to discuss their work publicly. “We were asked very […]

Siemens, McAfee team up to defend against critical infrastructure attacks Published 18 April 2011

McAfee and Siemens will work together to help secure critical infrastructure against cyber attacks that target industrial control processes like the Stuxnet worm which destroyed nuclear centrifuges at an Iranian nuclear enrichment facility; the two companies are targeting Advanced Persistent Threats aimed at the manufacturing and process industry; this new security product could help ease […]

An Iranian military commander has accused German engineering company Siemens

(Reuters) – An Iranian military commander has accused German engineering company Siemens of helping the United States and Israel launch a cyber attack on its nuclear facilities, Kayhan daily reported on Sunday. Gholamreza Jalali, head of Iran’s civilian defense, said the Stuxnet virus aimed at Iran’s atomic program was the work of its two biggest […]

Disaster-zone phone communication software available for free

Published 14 April 2011 Australian researchers developed software which enables mobile phones to communicate during a disaster; it will be freely available to the public by the end of the year thanks to the support of the Dutch NLnet Foundation; the software can be used on compatible mobile phone handsets to create an alternative “network” […]

Securing critical infrastructure no short term fix

Federal officials have long sought to secure critical infrastructure from potential attack, and recent events like the 2003 blackouts and the Stuxnet virus have added increasing urgency to government and private sector efforts; speaking on a panel at the Government Security conference and expo in Washington, D.C., security experts that specialize in critical infrastructure discussed […]

U.S. industrial processes vulnerable to Stuxnet-like attack

  Cyber security experts recently warned that U.S. manufacturing plants and critical infrastructure were vulnerable to a Stuxnet-like attack; industrial plants, transportation systems, electrical grids, and even nuclear plants could be crippled by new cyber weapons that target specialized control core processes; concern has spread after the Stuxnet virus targeted these systems and created physical […]

Businesses cannot defend against cyber attacks, expert says

In a recent testimony before Congress, a cyber security expert warned that the private sector in the United States has proven unable to defend the nation’s critical cyber infrastructure from attack; businesses own 85 percent of critical infrastructure and they have not invested in the skills or technology to secure it from cyber attack leaving […]

Researchers Show How a Car’s Electronics Can Be Taken Over Remotely

By JOHN MARKOFF/NYT With a modest amount of expertise, computer hackers could gain remote access to someone’s car — just as they do to people’s personal computers — and take over the vehicle’s basic functions, including control of its engine, according to a report by computer scientists from the University of California, San Diego and […]