Web Toolbar by Wibiya Welcome to the Malware-Industrial Complex

The Cuckoo's Nest

Conspiracy UFO Alternative News Paranormal Debate
 
HomeCalendarFAQSearchMemberlistUsergroupsRegisterLog in



Share | 
 

 Welcome to the Malware-Industrial Complex

View previous topic View next topic Go down 
AuthorMessage
I⊥∀NIW∩LLIʞ
Admin
Admin
avatar

Posts : 1386
Reputation : 3
Join date : 2012-12-27

PostSubject: Welcome to the Malware-Industrial Complex   Wed Mar 13, 2013 12:43 pm

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating critical security holes discovered in widely used software. But while the conferences continue to draw big crowds, regular attendees say the bugs unveiled haven’t been quite so dramatic in recent years.

One reason is that a freshly discovered weakness in a popular piece of software, known in the trade as a “zero-day” vulnerability because the software makers have had no time to develop a fix, can be cashed in for much more than a reputation boost and some free drinks at the bar. Information about such flaws can command prices in the hundreds of thousands of dollars from defense contractors, security agencies and governments.

This trade in zero-day exploits is poorly documented, but it is perhaps the most visible part of a new industry that in the years to come is likely to swallow growing portions of the U.S. national defense budget, reshape international relations, and perhaps make the Web less safe for everyone.

Zero-day exploits are valuable because they can be used to sneak software onto a computer system without detection by conventional computer security measures, such as antivirus packages or firewalls. Criminals might do that to intercept credit card numbers. An intelligence agency or military force might steal diplomatic communications or even shut down a power plant.

It became clear that this type of assault would define a new era in warfare in 2010, when security researchers discovered a piece of malicious software, or malware, known as Stuxnet. Now widely believed to have been a project of U.S. and Israeli intelligence (U.S. officials have yet to publicly acknowledge a role but have done so anonymously to the New York Times and NPR), Stuxnet was carefully designed to infect multiple systems needed to access and control industrial equipment used in Iran’s nuclear program. The payload was clearly the work of a group with access to government-scale resources and intelligence, but it was made possible by four zero-day exploits for Windows that allowed it to silently infect target computers. That so many precious zero-days were used at once was just one of Stuxnet’s many striking features.

more here: http://www.technologyreview.com/news/507971/welcome-to-the-malware-industrial-complex/

_________________
It takes nothing to join the crowd. It takes everything to stand alone.
- Hans Hansen


Follow us on Twitter @CuckooKilla
Back to top Go down
View user profile http://thecuckoosnest.forumotion.com
 
Welcome to the Malware-Industrial Complex
View previous topic View next topic Back to top 
Page 1 of 1
 Similar topics
-
» Hilla residential complex completed
» 8 Industrial Uses for Coke Which Prove it’s Not Fit for Human Consumption
» SKC Location?
» Dortmund during WWII
» Najaf Chamber of Commerce is preparing for the establishment of an international industrial trade fair

Permissions in this forum:You cannot reply to topics in this forum
The Cuckoo's Nest :: The Cuckoo's Nest-
Jump to:  
Affiliates

Future Google PR for thecuckoosnest.forumotion.com - 4.00 Free Url Submission Forum Topsite
conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy