www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SC World Congress NYC
SC Congress Canada
SCWC 24/7
Editorial Webcasts
Vendor Webcasts
Podcasts
SC Awards U.S.
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
Stuxnet
Stuxnet: Lessons not yet learned?
Charles Jeter, ESET cybercrime investigator November 03, 2010
According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.
Fending off cyberwar attacks
Illena Armstrong
November 01, 2010
Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'
Cyberespionage: Raids from afar
Greg Masters
November 01, 2010
The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
Cyber threat: Gathering intelligence
Angela Moscaritolo
November 01, 2010
Experts explain how organizations can best implement a cyberthreat intelligence initiative to collect, analyze and share data to detect and respond to an existing compromise or prevent a future threat.
Iranian Cyber Army shifts efforts toward malware, botnets
Dan Kaplan
October 25, 2010
A hacker group responsible for defacement attacks against Twitter and Baidu now appears to be amassing a mighty botnet, according to researchers at a security firm.
Consultant to describe security tools for anyone's budget
Dan Kaplan
October 20, 2010
Security expert Adam Meyers will expose attendees to security tools and technologies that they may not have otherwise known about.
Stuxnet worm shows critical infrastructure attacks no longer just Hollywood hype
Harry Sverdlove, CTO, Bit9 October 18, 2010
Computer security professionals can learn from the Stuxnet outbreak.
Stuxnet: Cyber warfare's game-changer, Part Two
Charles Jeter, ESET cybercrime investigator October 14, 2010
Is Stuxnet cyber warfare's Trinity Test?
Stuxnet: Cyber warfare's game-changer, Part One
Charles Jeter, ESET cybercrime investigator October 14, 2010
Is Stuxnet cyber warfare's Trinity Test?
IE, Office, Windows get patches in latest Microsoft update
Dan Kaplan
October 12, 2010
Microsoft on Tuesday shipped 16 patches for a record-setting 49 vulnerabilities affecting Windows, Internet Explorer, Office and the .NET Framework.
Stuxnet examined at Vancouver conference
Danny Bradbury
October 08, 2010
Researchers presenting findings on the Stuxnet worm said "This is not a teenage hacker coding in his bedroom-type operation."
Another record number of flaws to be fixed by Microsoft
Dan Kaplan
October 07, 2010
Microsoft's October security update will be a doozie, as 16 patches for 49 vulnerabilities is planned.
From sci-fi to Stuxnet: Exploding gas pipelines and the Farewell Dossier
Charles Jeter, ESET cybercrime investigator September 30, 2010
Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.
What you can learn from Stuxnet
Charles Jeter, ESET cybercrime investigator August 05, 2010
The organization which created Stuxnet also took pains to either steal or falsify a certificate.
Latest News
Making the case for the iPhone
Ousted CISO explains challenges of his former job
Analyzing the truth behind the advanced persistent threat
Quiet Microsoft update fixes 11 flaws with three patches
Breaches cost health care industry $6 billion annually
Popular data exchange app "Bump" suffers security lapse
Five ways to enjoy your Apple and keep your corporate network squeaky clean
Adobe investigating DoS "issue" in Reader
Facebook, Twitter fail latest security assessment
10 Minutes on Universal Log Management
Most Popular
Most Emailed
Most Recent
Facebook, Twitter fail latest security assessment
Federal gov't releases draft cloud security guidelines
Microsoft tool unable to detect new versions of Zeus
"Iranian Cyber Army" cons fellow crooks with honeypot
New Internet Explorer bug found in the wild
Adobe investigating DoS "issue" in Reader
Five ways to enjoy your Apple and keep your corporate network squeaky clean
Office, Unified Access Gateway to see fixes from Microsoft
Breaches cost health care industry $6 billion annually
Popular data exchange app "Bump" suffers security lapse
Trojan found disguised as Microsoft anti-virus product
Firefox zero day being exploited in the wild
Federal gov't releases draft cloud security guidelines
Texas insider sentenced to 15 years for medical ID theft
Indiana attorney general sues WellPoint over breach
Facebook, Twitter fail latest security assessment
Firefox add-on allows session hijacking of popular sites
Law enforcement of cybercrime: Bringing justice
NERC requiring power companies to mitigate Aurora flaw
Cellular phone calls: Do you know who is listening?
MAEC schema can benefit malware researchers
Automated patches necessary for true endpoint security
Distributed breaches increase this year
Targeted, smarter attacks dominate 2010 threat landscape
Making the case for the iPhone
Ousted CISO explains challenges of his former job
Analyzing the truth behind the advanced persistent threat
Quiet Microsoft update fixes 11 flaws with three patches
Breaches cost health care industry $6 billion annually
Popular data exchange app "Bump" suffers security lapse
Popular Topics
Adobe
Apple Threats
Breaches & Exposures
Browser Flaws
Browsers And Security
Cloud Computing
Counterintelligence
Cyber Attacks
Cyber Threat Intelligence
Cyber War
Data Breaches
Data Theft
Education
Finance
Government
Healthcare
Industrial Espionage
Law Enforcement
Malware
Non-Microsoft Patches
Patch Management
Spam
Stuxnet
Vulnerabilities & Flaws
Zeus
Sponsored Links