Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Stuxnet
The Duqu virus, widely known as a "twin" to the Stuxnet worm that targeted Iran's nuclear infrastructure, is evolving yet again. Software security firm Symantec said the program has a new variant altered "just enough...to evade some security product detections."
This virus is installing itself thorough a vulnerability in handling of TrueType fonts.
The Stuxnet worm doesn't have a twin after all. Last month Symantec discovered a malware threat with such strong similarities to Stuxnet they called it the Son of Stuxnet.
The virus is called "duqu" because it creates files with the letters "DQ" in the prefix.Cybersecurity experts say the malicious code can collect data, then lie in wait for future attacks.
U.S. utilities and industries face a rising number of cyber break-ins by attackers using more sophisticated methods, a senior Homeland Security Department official said.
Many cyber experts think Israel was behind the malware, possibly with some help from the U.S. But Rogachyov's comments were the first official statement from Russia blaming the US and Israel.
The Stuxnet worm struck again. This time the target was an Iranian nuclear power plant, fueling rumors that Stuxnet was designed to attack Iranian nuclear facilities
The House is preparing to once again take up legislation that would grant the Federal Energy Regulatory Commission new authority to order private electrical grid operators to take emergency action in the event of a cyber attack or a new vulnerability. The power would extend to bulk electric systems and parts of the grid that supply electricity to Defense infrastructure that is critical to national security.
Tags: Congress , technology , cybersecurity , DoD , critical infrastructure , FERC , National Electric Reliability Corporation , White House , Energy and Commerce Committee , Paul Stockton , Joseph McClelland , Franklin Kramer , Barry Lawson , National Rural Electric Cooperative Association , Jared Serbu
Next Gov reports that hackers might try to re-engineer the malicious worm.
Even in a year in which the Stuxnet attack targeted critical infrastructure systems and attacks on grid operators rose dramatically, operators of critical infrastructure around the world took few steps to increase their cyber defenses, a new report found.
Tags: technology , management , cybersecurity , critical infrastructure , McAfee , Center for Strategic and International Studies , DHS , White House , FERC , Michael Peters , Stewart Baker , Jared Serbu , Cybersecurity Update