The oil giant confirms that Stuxnet infected its network back in 2010, when the malware was first discovered - making Chevron the first U.S. company to admit it was struck by the virus.
Kurt Grutzmacher was planning to disclose and demo vulnerabilities in the networking products from Huawei and H3C, a subsidiary of HP.
Already famous for their sophistication, Flame and Gauss malware have yielded a new develompent. Dubbed MiniFlame, the component is deployed after Flame and Gauss already are installed on targeted machines.
Dell SecureWorks researchers believe recent attacks targeting oil and energy companies in various countries are connected to cyber criminals behind RSA's breach and the GhostNet esionage campaign.
September 04, 2012
Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.
September 04, 2012
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news
July 02, 2012
The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.
Flame, Stuxnet, breach at LinkedIn and other security news
July 02, 2012
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.
July 02, 2012
While the characteristics of the spy virus are important to note, the question is why it went undetected for so long.
June 04, 2012
Does the fact that the Flame malware stayed below the radar for so long prove that signature detection is dead?
May 30, 2012
A report from researchers at the University of Cambridge alludes to vulnerabilities being intentionally inserted into Chinese-manufactured chips used by the military. But at least one security expert called the study light on facts.
May 30, 2012
While the investigation is just beginning into the massive espionage toolkit known as Flame, which has targeted computers, mainly in Iran, it is important to consider the consequences of this malware.
Private and public sectors must take seriously the need to share threat data to prevent cyber attacks, but a heavy-handed approach like CISPA places us at far greater risk as a country.
April 02, 2012
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
April 02, 2012
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
January 02, 2012
Instead of spending billions of dollars to supply massive armies, today's adversaries hire code-writers to create attacks that run autonomously for years with little or no human intervention.