HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

10 Cyber Attacks That Wreaked Havoc

View Comments: Newest First|Oldest First|Threaded View
<<  <  Page 3/3
tekochip
User Rank
Platinum
Re: Lessons of history
tekochip   5/14/2014 10:06:23 AM
NO RATINGS
I think wants really important about that story was that the Stuxnet wormed its way into the PLC code and destroyed the centrifuges making fissionable material.  The attack was very direct and designed to perform a very exacting purpose.  It wasn't just a kid throwing a brick through the window, it was a spy sneaking into the facility and blowing up Iran's nuclear program.

Elizabeth M
User Rank
Blogger
Re: Lessons of history
Elizabeth M   5/14/2014 7:09:55 AM
NO RATINGS
Well that is quite scary, then! I actually like that you included some that may be lesser know.

Rob Spiegel
User Rank
Blogger
Re: Lessons of history
Rob Spiegel   5/14/2014 7:04:06 AM
NO RATINGS
Elizabeth, this is just a sampling. I didn't include attcks on commercial enterprise for cc numbers such as attacks on Sony, BoA, and Target.

Elizabeth M
User Rank
Blogger
Lessons of history
Elizabeth M   5/14/2014 6:55:44 AM
NO RATINGS
Interesting slideshow, Rob! I bet some in the industry would like to forget about these, but it's good to remember to learn from past mistakes. Stuxnet, for example, really showed organizations that external storage and media can wreak havoc if not properly secured. I didn't even know some of these attacks happened--another good reason to make them more public. I think sometimes it behooves those in the industry to keep this stuff on the down low, but it's far better for the public to be aware of the threats that exist.

<<  <  Page 3/3
Partner Zone
More Blogs
Manufacturers are speeding design by including their suppliers in the process – and it’s not just automotive and aerospace.
Design engineers and project managers work closely with the quality department and know that quality is as important as functional utility. Here's how the best companies do it, says ASQ.
Thanks to the Internet of Things, hardware developers are undertaking a flurry of potentially lucrative software developments.
While there are tremendous opportunities in the consumer space for AR, a Juniper Research report says the enterprise AR market will grow tenfold by 2019.
DuPont's cyber security assessment of its Texas plants is an effective blueprint for anyone looking to create a strategy for cyber protection.
Design News Webinar Series
6/25/2015 11:00 a.m. California / 2:00 p.m. New York
6/24/2015 11:00 a.m. California / 2:00 p.m. New York
6/11/2015 11:00 a.m. California / 2:00 p.m. New York
8/13/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Aug 3 - 7, Developing, Testing, and Troubleshooting IPv4 and IPv6 Using Wireshark
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course August 25-27:
Sponsored by Stratasys
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service