HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Comments
You must login to participate in this chat. Please login.

@Anatoliy - If the device or software is capable of resetting to factory default/golden image, this would eliminate the threat as long as all memory and storage is also reset in full. Preventing damage would depend on how long the exposure was for and what systems it touched.

Blogger

No.   I haven't heard of the Morris worm.

Iron

Ahhh, I finally had a chance to read about the Automated hacking tools that swarm Web site login pages.  Interesting!

Iron

Thank you Clint and DK-CEC

Is it possible to prevent any damage in case of cyber attack by putting affected hardware in safe default state with option of manual reset?

Yes, heard about Morris worm

I had a CD infected with virus, I had to install some SW on my PC.

Good presentation, thanks Clint

Iron

I use malwarebytes on my computers and it finds spyware and aware, that my system mechanic products doe not find.

Iron

I was once asked to find a diagram for a 4-wheeler. I opened the file and after I got my machine back from the shop, it has never been the same for years! It's as bad as porn files.

Iron

Yeah, I know I have to take XP off-line soon and switch my OS.  Thanks a lot, see you tomorrow.

Iron

Ok everyone, I'm signing off for today. See you tomorrow!

Blogger

Patch as much as you can, use Java as minimally as possible, use ample security software and controls... and UPGRADE YOUR OS (if possible)!

Blogger

Java has been known to have several issues. Unfortunately, it is a necessary evil for many applications to run these days. As far as XP goes, it is no longer supported by Microsoft so the amount of resources spent on patching issues is dwindelling. Put those together, Java is certainly dangerous to XP (as Java is usually a danger to most any operating system.) XP has been and continues to be an increasing danger to itself! :-)

Blogger

Good point Clint.  BTW, I heard a few mos ago that running JAVA is dangerous to my Win XP.  Is that true?

Iron

Any other questions? Last call! :-)

Blogger

Mine was once invaded by a trojan file #W xxx something or other, I forget its name!

Iron

I find it interesting that many of you responded with answers such as: "I've never used such tools, etc. because Im not a hacker." Remember, it's part of knowing the adversary. It's important to know and understand the tools and means they use in order to truly understand how to defend against them.

Blogger

@dgrinch - I do everything of this nature from an anonymized and secure "sandboxed" machine. In my line of work you have to. But that's what I recommend for anyone that wants to experiment with this sort of thing. 

Blogger

@dgrinch - I do everything of this nature from an anonymized and secure "sandboxed" machine. In my line of work you have to. But that's what I recommend for anyone that wants to experiment with this sort of thing. 

Blogger

@fpopoff-- Of course I'm not sure I could trust those guys. If I go to their site and download something I'd be afraid that they were infecting my machine... maybe using it for some nepharious purpose.

Iron

Good lecture, but problems on my surface tablet for the audio player, tryed to reboot the Page, but did not work, so used my BlackBerry playbook for audio.

Iron

Thank you for the information.  You can create by sign up at shodanhd.com for anyone that interested.

understood. Thanks for presentation.

 

Iron

@78RPM - I agree. But sometimes all the tact in the world does no good for some individuals bent on a vendetta

Blogger

Happy Hacking all! See you tomorrow.

Iron

@dgrinch - *not specifically is what I meant to say

Blogger

@jjrochow - I got the image off of shutter stock so it's clear according to the royalty free license :-)

Blogger

? Clint, it seems like a good non-tech way of minimizing Former Insider attacks seeking revenge would be to have very good personnel directors who can fire someone with tact and dignity, leaving the departing employee with some dignity. Such diplomacy can minimize a variety of threats. Correct?

Gold

@dgrinch - Probably not specific... but isn't everybody on the NSA's surveillance list now? :-)

Blogger

Thank you for another informative lecture

Great class, Thanks.

Iron

Thank you Clint, Design News, and Digi-Key!

Gold

good lecture look forward to tomorrow

Iron

thank you  very useful

Iron

Very good, see you all on HUMP DAY!!!

Iron

Q: If I try to obtain SHODAN will I end up on an NSA surveillance list? ;-)

Iron

Thanks Clint and Rich.

Iron

Clint, thank you for today's lecture

Also thank you to Rich, Design News and Digi-key

Iron

Awesome... Thank You,

Iron

very interesting thank you

Very interest.  Thank you.

Iron

john006, reload. it's working for me

Blogger

 

I think this qualifies for education exclusion 

Iron

Do you have Hormel's permission to use their product image?

Metasploit version comparison:

https://community.rapid7.com/docs/DOC-2287

worth a look.

Iron

No Rich, I'm not really into hacking.

Iron

Metasploit etc. -- heard of them and installed abd tested them.

Iron

I've heard of auto hacking tools, never explored any though.  Not a hacker!  :)

Iron

 

I am aware of them but never had a need to use any

Iron

haven't heard of them.

Gold

Never heard of any of these!

Iron

Have you heard of the automated hacking tools?

Blogger

I'd consider adware "malware" too beecause its bad LOL

http://en.wikipedia.org/wiki/Morris_worm

Iron

No, just had a problem with Sasser Worm way back when.

Iron

 

I don't recall hearing of Morris worm

Iron

I hadn't heard of it

Blogger

have not heard about

Iron

Have not heard...

 

Iron

dont remember that one.  I have cleaned up many old ones (Monkey)

have not heard of Morris Worm

Gold

Have you heard of the Morris worm?

Blogger

Boot-sector virus from 3.5" floppy.   Yes, these are still occasionally used to move files onto very old test systems. (difficult to find).

 

Iron

Number 9, Number 9 (for you Beatles fans)

Blogger

yes, some but lots of adware

Iron

Mine was thru a jump drive from a photo kiosk at the department store

Iron

a few times by email and web sits

Iron

I ruined my flash files and computers fron an infected workstation in the English lab at the University.

Iron

I have received an email virus

Iron

have been infected by a virus  on home desktop PC maybe three times over 15 years...Never at work.

Iron

My kids find some interesting bugs when they surf the internet at home.

Iron

anti-virus software caught a couple in time

Iron

Have been bitten, by operators downloading affected files via email etc that they thought was safe.

Iron

Have received infected file on personal email in the past.

Iron

Not yet personnally. We have had issues here at our shop.

Iron

 

one every three years

Iron

From website while visiting

Iron

How many of you have been affected by a file that you assumed was safe?

Blogger

Good source of hacking activities and exposure, Verizon's yearly free report "DBIR" is a definitive guide.

http://www.verizonenterprise.com/DBIR/2013/

Iron

 

No hacking that I know of, just spam with viruses that were just quickly cleared.

Iron

No hacks here...I think.

Iron

thots - i was at a presentation at a local trade show, the presenter went into takeover of your new wireless car by a hacker, how real could it be?

 

Iron

No hacks. Not that we know of, yet.

 

Hasn't everybody been hacked at least once?

Iron

Yes a couple of hacks -- quickly fixed

 

Iron

Hello from El Paso, TX

 

Iron

Hi all -Audio is live! If you don't see the audio bar at the top of the screen, please refresh your browser. It may take a couple tries. When you see the audio bar, hit the play button. If you experience audio interruptions and are using IE, try using FF or Chrome as your browser. Many people experience issues with IE. Also, make sure your flash player is updated with the current version. Some companies block live audio streams, so if that is the case for your company, the class will be archived on this page immediately following the class and you can listen then. People don't experience any issues with the audio for the archived version.

Hello from Albuquerque.

Iron

-Be sure to follow @designnews and @DigiKeyCEC on Twitter for the latest class information. We encourage you to tweet about today's class using the hashtag #CEC.

Blogger

Season Greeting to all from sunny California.

 

Hello from Montana.

My concerns were heightened. Makes me realize we need more decentralized power systems. I also laugh at guys around here who think their guns will protect them from the guvmint.

Gold

My apologizes, but I will need to leave class early today. 

Iron

Hello from Cedar Rapids Iowa

Iron

I found that after yesterday's lecture I am indeed a little more concerned about infrastructure security.

Iron

Good afternoon.  I have downloaded today's slide deck from the link above.  Thank you.

Iron

Here's the legalise:

-The streaming audio player will appear on this web page when the show starts at 2 PM Eastern time today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. If that doesn't work, try using Firefox or Google Chrome as your browser. Some users experience audio interruptions with IE. If that doesn't work, the class will be archived immediately following our live taping.

Blogger

18 minute warning. Download the PPT from the link above

Blogger

@tpyn - Then either you are already doing something right or your concerns were already hightened?

Blogger

Clint

Yesterday's presentation didn't increase my concerns one bit.

Iron

Transferring them to my phone app doesn't work either. She is a better hacker than I am. :-)

Blogger

I can't keep Starbucks gift cards. My wife takes them.

Blogger

I hope I win a $25 Starbucks gift card..I need some coffee today!!!

So who found themselves a bit concerned about critical infrastructure/industrial security after yesterday's lecture? (Not that it was intended to incite fear... but it's reality.)

Blogger

Hello everyone. Glad to be back.

Blogger

richnass

The front you have now left 8" in my area Saturday, another front left 2" yesterday and 2" today of blowing and drifting. 

 

hello from Mishawaka

Iron

Hello from sunny Albuquerque.

Iron

Hello to all!

Great day here.

 

Iron

Good morning from snowy (UGH!!) NJ. You know the drill. Download the slides from the link above and we'll talk to you at 2:00 EST (123 minutes from now)

Blogger

Good morning from Mobile, AL

Good Monring from Texas!

Iron

Morning from Portland Oregon

Iron


Partner Zone
Latest Analysis
Factory floor engineers may soon be able to operate machinery and monitor equipment status simply by tapping their eyeglasses.
GE Aviation not only plans to use 3D printing to mass-produce metal parts for its LEAP jet engine, but it's also developing a separate technology for 3D-printing metal parts used in its other engines.
In this TED presentation, Wayne Cotter, a computer engineer turned standup comic, explains why engineers are natural comedians.
IBM's new SyNAPSE chip makes it possible for computers to both memorize and compute simultaneously.
The “Space Kid,” 11, will be one of the first civilians to have his design manufactured in space by NASA, thanks to the City X Project, which inspires kids to think about new 3D-printed inventions that could be useful for humans living in space.
More:Blogs|News
Design News Webinar Series
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
6/25/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Sep 22 - 26, MCU Software Development – A Step-by-Step Guide (Using a Real Eval Board)
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service