Web Toolbar by Wibiya Welcome to the Malware-Industrial Complex

The Cuckoo's Nest

Conspiracy UFO Alternative News Paranormal Debate
 
HomeLatest imagesSearchRegisterLog in



 

 Welcome to the Malware-Industrial Complex

Go down 
AuthorMessage
I⊥∀NIW∩LLIʞ
Admin
Admin
I⊥∀NIW∩LLIʞ


Posts : 1386
Reputation : 3
Join date : 2012-12-27

Welcome to the Malware-Industrial Complex Empty
PostSubject: Welcome to the Malware-Industrial Complex   Welcome to the Malware-Industrial Complex I_icon_minitimeWed Mar 13, 2013 12:43 pm

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating critical security holes discovered in widely used software. But while the conferences continue to draw big crowds, regular attendees say the bugs unveiled haven’t been quite so dramatic in recent years.

One reason is that a freshly discovered weakness in a popular piece of software, known in the trade as a “zero-day” vulnerability because the software makers have had no time to develop a fix, can be cashed in for much more than a reputation boost and some free drinks at the bar. Information about such flaws can command prices in the hundreds of thousands of dollars from defense contractors, security agencies and governments.

This trade in zero-day exploits is poorly documented, but it is perhaps the most visible part of a new industry that in the years to come is likely to swallow growing portions of the U.S. national defense budget, reshape international relations, and perhaps make the Web less safe for everyone.

Zero-day exploits are valuable because they can be used to sneak software onto a computer system without detection by conventional computer security measures, such as antivirus packages or firewalls. Criminals might do that to intercept credit card numbers. An intelligence agency or military force might steal diplomatic communications or even shut down a power plant.

It became clear that this type of assault would define a new era in warfare in 2010, when security researchers discovered a piece of malicious software, or malware, known as Stuxnet. Now widely believed to have been a project of U.S. and Israeli intelligence (U.S. officials have yet to publicly acknowledge a role but have done so anonymously to the New York Times and NPR), Stuxnet was carefully designed to infect multiple systems needed to access and control industrial equipment used in Iran’s nuclear program. The payload was clearly the work of a group with access to government-scale resources and intelligence, but it was made possible by four zero-day exploits for Windows that allowed it to silently infect target computers. That so many precious zero-days were used at once was just one of Stuxnet’s many striking features.

more here: http://www.technologyreview.com/news/507971/welcome-to-the-malware-industrial-complex/
Back to top Go down
https://thecuckoosnest.forumotion.com
 
Welcome to the Malware-Industrial Complex
Back to top 
Page 1 of 1
 Similar topics
-
» PROPAGANDA: AND THE AWARD GOES TO THE MILITARY INDUSTRIAL COMPLEX
» Sinkhole swallows building complex in China
» 'Red October' malware: what you need to know
» Tit for Tat - China was the top malware infected country in 2012
» Security Firm Bit9 Hacked, Used to Spread Malware

Permissions in this forum:You cannot reply to topics in this forum
The Cuckoo's Nest :: The Cuckoo's Nest-
Jump to:  
Affiliates

Future Google PR for thecuckoosnest.forumotion.com - 4.00 Free Url Submission Forum Topsite
conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy, conspiracy