HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Comments
View Comments: Newest First|Oldest First|Threaded View
Page 1/3  >  >>
AnandY
User Rank
Gold
Re: Lessons of history
AnandY   5/27/2014 1:50:43 PM
NO RATINGS
Cyber attacks are the worst things that can ever happen. It brings about a lot of havoc and a lot of data is usually lost when this happens. The cyber attacks usually end up distracting the running business of a company and they bring a lot of confusion. The worst thing about these attacks is that they happen in many forms and you cannot really predict when they will happen. Companies should have better security enforced to ensure that all their important data is kept intact.

bobjengr
User Rank
Platinum
CYBER ATTACKS
bobjengr   5/23/2014 5:32:03 PM
NO RATINGS
Excellent post Rob.  Some say I'm paranoid but potential hacking is the reason I have not converted my system to the "cloud".  I even have personal data, financial in nature, on a system not connected to the internet. All of my company accounting is not internet connected.   I have just been "hacked" by the Heart Bleed virus-- enough is enough.  I have had to change most my passwords due to the slugs propagating this mess.  This is after I thought I was protected with a fire-wall, mal-wear protection and virus protection.  It was a long winter.  I think these hacking expeditions are the norm and not the exception.  Again, great post Rob.  

Cabe Atwell
User Rank
Blogger
Re: the dangers of connectedness
Cabe Atwell   5/16/2014 4:59:52 PM
NO RATINGS
You can add 'Operation Saffron Rose' to that list as the Iranian Ajax Security Team recently unleashed the malicious proxy software on American defense contractors. 

Charles Murray
User Rank
Blogger
Re: the dangers of connectedness
Charles Murray   5/15/2014 5:26:51 PM
NO RATINGS
Well said, David. I agree that novelty and laziness are two of the reasons for connectedness. In corporations, I think it's also a matter of of follow-the-crowd competitiveness. If Company A and Company B are doing it that way, than I must need to do it that way, too, right? In many cases, it seems like it would be a good idea to re-examine the importance of connectness, in light of the potential downsides.  

tekochip
User Rank
Platinum
Re: Lessons of history
tekochip   5/15/2014 12:17:57 PM
NO RATINGS
Yea, but I wouldn't call them hackers, I would call them foreign agents.  In this case, it was probably my very own government.

Elizabeth M
User Rank
Blogger
Re: Lessons of history
Elizabeth M   5/15/2014 11:52:47 AM
NO RATINGS
Indeed, tekochip, you illustrate a good point--the sophistication of some of these attacks. I think that's what really worried security experts so much about Stuxnet--how targeted and specific it was, and how stealthy. Very troubling that hackers can achieve this level of threat.

bronorb
User Rank
Silver
Stuxnet Loose?
bronorb   5/15/2014 11:37:11 AM
NO RATINGS
From what I've read the Stuxnet virus, a very expensive and detailed joint project by US and Israel, was delivered by a spy using a USB stick into one of the Iranian facilities. Once it performed its task it stayed there hidden for awhile. In the meantime, they think, an Iranian employee inadvertently brought it home on a laptop and it made its way to the internet. The problem is that the programmers did not write any failsafes into the code to lock it down in case it left the Iranian facilities.

They say it's out there now and all it will take is a hacker with the knowledge to break it apart and turn it against... anyone.

rosek
User Rank
Silver
Re: the dangers of connectedness
rosek   5/15/2014 11:04:46 AM
NO RATINGS
@David - You are correct! It's the novelty of those features that makes people want a new cell phone whenever the latest tweak is introduced, not any real need.

I remember the Sci-Fi series Battlestar Galactica, where networks were rarely used because their robots kept hacking them and wreaking havoc. Prescient, perhaps?

jclift
User Rank
Iron
Re: the dangers of connectedness
jclift   5/15/2014 9:25:53 AM
NO RATINGS
The stuxnet worm was inserted into a unconnected system using usb sticks that had wireless transceivers that communicated with a remote base station. Workers at one Iranian facilty went to move a large rock and it eploded and pieces of circuit baors flew all over.

jclift
User Rank
Iron
Re: the dangers of connectedness
jclift   5/15/2014 9:25:51 AM
NO RATINGS
The stuxnet worm was inserted into a unconnected system using usb sticks that had wireless transceivers that communicated with a remote base station. Workers at one Iranian facilty went to move a large rock and it eploded and pieces of circuit baors flew all over.

Page 1/3  >  >>


Partner Zone
Latest Analysis
Enabling the Future is designing prosthetic appendages modeled more like superhero arms and hands than your average static artificial limbs. And they’re doing it through a website and grassroots movement inspired by two men’s design and creation in 2012 of a metal prosthetic for a child in South Africa.
In order to keep an enterprise truly safe from hackers, cyber security has to go all the way down to the device level. Icon Labs is making the point that security has to be built into device components.
Senior Technical Editor Chuck Murray gets the skinny on Harting Inc.'s 3D MID technology, which allows users to create a three-dimensional circuit board out of molded plastic.
Three days after NASA's MAVEN probe reached Mars, India's Mangalyaan probe went into orbit around the red planet. India's first interplanetary mission, and the first successful Mars probe launched by an Asian nation, has a total project cost of nearly $600 million less than MAVEN's.
Siemens PLM Software has made an in-kind donation of software to Central Piedmont Community College in North Carolina for its science, technology, engineering, and mathematics (STEM) Division.
More:Blogs|News
Design News Webinar Series
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service