In a sure sign that the virtual currency Bitcoin has hit the mainstream, a new Trojan horse program discovered in the wild Thursday seeks out and steals victims’ Bitcoin wallets, the same way other malware goes for their banking passwords or credit card numbers.
This story is about how a new highly sophisticated computer malware, named stuxnet, has infected industrial sites in Iran, India and Indonesia. The reason I'm posting this is because all major U.S. news sites with the exception of Bloomberg is reporting that this is most likely a nation state attack and not a hacker attack. also, they do not make it clear that industrial systems are not on the web, this was a physical USB infection. This is important because there has been some moves to place more controls on the web because of potential cyber attack.
Flame — a complex cyberweapon that forced Iran to cut off its Oil Ministry rigs from the Internet — was reportedly written using the same language as games such as Angry Birds. Fox News reports that the virus was written using the computer language LUA, which game programmers like because it’s simple and stable. It’s also easy to embed, the report said, and Flame’s authors may have used the language to make the virus harder to detect.
Near nightfall, toward the end of our play session and almost without my notice, a car slowly pulled into the lot and stopped in a spot away from us. I do not remember giving the car or its driver a second glance; we continued as before.
Oh, sure, I occasionally caught the smell of something odd, but I thought it would soon pass. Then, on the periphery of my vision, I spotted a glimpse of a flame as it burned bright, emanated some smoke, and then dulled into a mellowed orange. I reacted. Why?
It’s one of the most hostile hacker environments in the country –- the DefCon hacker conference held every summer in Las Vegas.
But despite the fact that attendees know they should take precautions to protect their data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader.
The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view.
The latest round of documents published by Wikileaks offers a rare glimpse into the world of surveillance products. The collection—which Wikileaks calls the Spy Files—includes confidential brochures and slide presentations that companies use to market intrusive surveillance tools to governments and law enforcement agencies... The group says that these files are only the first set of a larger collection and that more will be published in the future.