HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

10 Cyber Attacks That Wreaked Havoc

View Comments: Newest First|Oldest First|Threaded View
Page 1/3  >  >>
AnandY
User Rank
Gold
Re: Lessons of history
AnandY   5/27/2014 1:50:43 PM
NO RATINGS
Cyber attacks are the worst things that can ever happen. It brings about a lot of havoc and a lot of data is usually lost when this happens. The cyber attacks usually end up distracting the running business of a company and they bring a lot of confusion. The worst thing about these attacks is that they happen in many forms and you cannot really predict when they will happen. Companies should have better security enforced to ensure that all their important data is kept intact.

bobjengr
User Rank
Platinum
CYBER ATTACKS
bobjengr   5/23/2014 5:32:03 PM
NO RATINGS
Excellent post Rob.  Some say I'm paranoid but potential hacking is the reason I have not converted my system to the "cloud".  I even have personal data, financial in nature, on a system not connected to the internet. All of my company accounting is not internet connected.   I have just been "hacked" by the Heart Bleed virus-- enough is enough.  I have had to change most my passwords due to the slugs propagating this mess.  This is after I thought I was protected with a fire-wall, mal-wear protection and virus protection.  It was a long winter.  I think these hacking expeditions are the norm and not the exception.  Again, great post Rob.  

Cabe Atwell
User Rank
Blogger
Re: the dangers of connectedness
Cabe Atwell   5/16/2014 4:59:52 PM
NO RATINGS
You can add 'Operation Saffron Rose' to that list as the Iranian Ajax Security Team recently unleashed the malicious proxy software on American defense contractors. 

Charles Murray
User Rank
Blogger
Re: the dangers of connectedness
Charles Murray   5/15/2014 5:26:51 PM
NO RATINGS
Well said, David. I agree that novelty and laziness are two of the reasons for connectedness. In corporations, I think it's also a matter of of follow-the-crowd competitiveness. If Company A and Company B are doing it that way, than I must need to do it that way, too, right? In many cases, it seems like it would be a good idea to re-examine the importance of connectness, in light of the potential downsides.  

tekochip
User Rank
Platinum
Re: Lessons of history
tekochip   5/15/2014 12:17:57 PM
NO RATINGS
Yea, but I wouldn't call them hackers, I would call them foreign agents.  In this case, it was probably my very own government.

Elizabeth M
User Rank
Blogger
Re: Lessons of history
Elizabeth M   5/15/2014 11:52:47 AM
NO RATINGS
Indeed, tekochip, you illustrate a good point--the sophistication of some of these attacks. I think that's what really worried security experts so much about Stuxnet--how targeted and specific it was, and how stealthy. Very troubling that hackers can achieve this level of threat.

bronorb
User Rank
Silver
Stuxnet Loose?
bronorb   5/15/2014 11:37:11 AM
NO RATINGS
From what I've read the Stuxnet virus, a very expensive and detailed joint project by US and Israel, was delivered by a spy using a USB stick into one of the Iranian facilities. Once it performed its task it stayed there hidden for awhile. In the meantime, they think, an Iranian employee inadvertently brought it home on a laptop and it made its way to the internet. The problem is that the programmers did not write any failsafes into the code to lock it down in case it left the Iranian facilities.

They say it's out there now and all it will take is a hacker with the knowledge to break it apart and turn it against... anyone.

rosek
User Rank
Silver
Re: the dangers of connectedness
rosek   5/15/2014 11:04:46 AM
NO RATINGS
@David - You are correct! It's the novelty of those features that makes people want a new cell phone whenever the latest tweak is introduced, not any real need.

I remember the Sci-Fi series Battlestar Galactica, where networks were rarely used because their robots kept hacking them and wreaking havoc. Prescient, perhaps?

jclift
User Rank
Iron
Re: the dangers of connectedness
jclift   5/15/2014 9:25:53 AM
NO RATINGS
The stuxnet worm was inserted into a unconnected system using usb sticks that had wireless transceivers that communicated with a remote base station. Workers at one Iranian facilty went to move a large rock and it eploded and pieces of circuit baors flew all over.

jclift
User Rank
Iron
Re: the dangers of connectedness
jclift   5/15/2014 9:25:51 AM
NO RATINGS
The stuxnet worm was inserted into a unconnected system using usb sticks that had wireless transceivers that communicated with a remote base station. Workers at one Iranian facilty went to move a large rock and it eploded and pieces of circuit baors flew all over.

Page 1/3  >  >>
Partner Zone
More Blogs
The phablet wars continue. Today we welcome the Nexus 6 -- a joint collaboration between Google and Motorola.
According to a study by the National Institute of Standards and Technology, one of the factors in the collapse of the original World Trade Center towers on Sept. 11, 2001, was the reduction in the yield strength of the steel reinforcement as a result of the high temperatures of the fire and the loss of thermal insulation.
Robots are getting more agile and automation systems are becoming more complex. Yet the most impressive development in robotics and automation is increased intelligence. Machines in automation are increasingly able to analyze huge amounts of data. They are often able to see, speak, even imitate patterns of human thinking. Researchers at European Automation call this deep learning.
Thanksgiving is a time for family. A time for togetherness. A time for… tech?
The promise of the Internet of Things (IoT) is that devices, gadgets, and appliances we use every day will be able to communicate with one another. This potential is not limited to household items or smartphones, but also things we find in our yard and garden, as evidenced by a recent challenge from the element14 design community.
Design News Webinar Series
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
11/6/2014 11:00 a.m. California / 2:00 p.m. New York
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Dec 1 - 5, An Introduction to Embedded Software Architecture and Design
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Last Archived Class
Sponsored by Littelfuse
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service