Gone Rogue? Virus Stuxnet Infects Russian Nuclear Plant, Space Station
2013 11 11
Red Ice Creations
Cyberwar and Stuxnet: Weaponized code a bad idea from start to finish, and here we see why...
The Stuxnet virus, thought to be created by US and Israeli governments to disable or disrupt Iran’s nuclear facilities, has reportedly "gone rogue" and infected a Russian nuclear power plant and even the Space Station.
Was this an accidental development, or was this the aim of the virus to begin with? Moreover, why aren’t the creators of such uncontrollable malware being confronted on such acts of war?
[READ: Act of War? President Obama Ordered Wave Of Cyber Attacks Against Iran]
In the age of incredible technology which can trigger nuclear cataclysm by accident (or purposefully), are ANY hands the ’right hands’?
Stuxnet Infected Russian Nuclear Plant, International Space Station, Claims Kaspersky
By Max Smolaks | Tech Week Europe
According to the charismatic CEO, malware created to disrupt Iranian nuclear research has travelled to space
Stuxnet, the cyber-weapon allegedly created by the US and Israel government forces to take out uranium processing centrifuges in Iran, also infected a Russian nuclear plant and even reached the International Space Station, claimed Eugene Kaspersky in a keynote at a National Press Club of Australia meeting.
According to the head of one of the world’s largest vendors of IT security products, the fact that the Russian facility wasn’t connected to the Internet didn’t stop the infection.
“Unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity,” warned Kaspersky. He also joked that all of the existing data has been stolen at least twice.
Stuxnet around the world
In 2010, Iranian president Mahmoud Ahmadinejad accused the country’s enemies of trying to disrupt uranium enrichment facilities in Natanz using Stuxnet, considered by some to be one of the most sophisticated pieces of malware ever discovered. According to Symantec, the oldest Stuxnet sample dates as far back as 2005.
A source allegedly told Kaspersky that a Russian nuclear facility was “badly infected” by Stuxnet, despite not being connected to the Internet – the practice known as ‘air gap’ security. Just like in Iran, the infection spread through USB memory sticks, which were previously connected to systems tainted by advanced malware.
Read the full article at: techweekeurope.co.uk
"Stuxnet, the first weapon made entirely out of code"
READ: Stuxnet leaker under investigation
Eugene Kaspersky Press Club 2013 (Full)
Eugene Kaspersky Presents "The threats of the Age of cyber-warfare"
Flame, Stuxnet Super Cyber Weapons Linked: Researchers
Stuxnet Virus found in Japan (Oct. 5, 2010) - power plants targeted
’Red October’: Global cyber-spy network uncovered by Russian experts
Did a USB Stick Infect a Russian Nuclear Plant with Stuxnet?
False Flag Cyber Attack Looming?
The House Passes CISPA ’Cybersecurity Bill’, Boston Bombings Invoked As Reason
Legal action must be taken against US over cyber attacks: Analyst
Latest News from our Front Page
Recent Israeli Synagogue Attack, a Possible False Flag?
2014 11 21
Dear Friends - I woke up yesterday morning to see a newspaper lying on the kitchen table with the front page proclaiming that five people were slain in an Israeli synagogue after a so-called "Palestinian attack." Some members of the media said that four people were killed, others said five, so it seems like that there was some confusion (or ...
The Michael Brown Shooting, Race Baiting for Political Power and Militarization of the Police
2014 11 21
From Youtube: The evidence clearly shows that Officer Darren Wilson was justified in shooting Michael Brown, so why is this case being hyped by the mainstream media and the leftist political establishment?
Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance
2014 11 21
Recent years have seen a boom in the adoption of surveillance technology by governments around the world, including spyware that provides its purchasers the unchecked ability to target remote Internet users’ computers, to read their personal emails, listen in on private audio calls, record keystrokes and passwords, and remotely activate their computer’s camera or microphone. EFF, together with Amnesty International, ...
New UK spy chief says tech giants aid terrorism, privacy not ‘absolute right’
2014 11 21
Robert Hannigan, the new head of GCHQ
The new head of Britain’s GCHQ, the UK equivalent of the NSA in the U.S., said he believes privacy is not an absolute right and that tech giants must open themselves up to intelligence agencies.
“GCHQ is happy to be part of a mature debate on privacy in the digital age,” Hannigan said. “But privacy ...
LOL: Atheist Feminist Pornographer Used as Moral Authority in T-shirt Row
2014 11 21
Dr. Matt Taylor was thrust into the headlines this last week, largely for his lead role in successfully landing a spacecraft on a comet 300 million miles from earth that travels at a speed of 85,000 mph. In short, Taylor and his colleagues pulled off one of the most amazing achievements in contemporary science and space exploration, and in a ...
|More News » |