Top Cybersecurity Official Cites Hacker Threat to Infrastructure
20 replies, posted
[TABLE]
[TR]
[TD][release] Global [SUB][SUP][URL=http://www.businessweek.com/news/2011-09-29/top-cybersecurity-official-cites-hacker-threat-to-infrastructure.html/]BW[/URL][/SUP][/SUB] - [b]Top Cybersecurity Official Cites Hacker Threat to Infrastructure[/b]
Damage inflicted by corporate data breaches this year pales in comparison to what might happen if a power grid or chemical plant were targeted by hackers or malicious software, a top U.S. cybersecurity official said.
A cyber attack on the nation’s critical infrastructure “could have cascading effects across multiple sectors” and is “another order of magnitude that we have to be worried about now,” Greg Schaffer, acting deputy undersecretary at the Homeland Security Department, said today.
The nation’s “adversaries” are “knocking on the doors of these systems and in some cases there have been intrusions,” Schaffer said, without detailing which companies were targeted and when.
Schaffer spoke during a tour of facilities at the Energy Department’s Idaho National Laboratory, where DHS has programs that assess technology vulnerabilities in utility, manufacturing and other systems and work with companies in those sectors to address specific cyberthreats. The laboratory is a center for nuclear energy research.
A cybersecurity proposal from the Obama administration calls for the Homeland Security Department to “work with industry” to shore up vulnerabilities in critical infrastructure, such as electrical grids and financial networks. The proposal, submitted to Congress in May, seeks to jump-start efforts in Congress to update U.S. laws in response to the increased threat of cyber attacks capable of crippling business and government operations.
[/release]
[/TD]
[TD][release][img_thumb]http://www.sikharchives.com/wp-content/uploads/2010/04/cyber_hackers201.jpg[/img_thumb]
[SUB][I]Cyber Hacking, number one threat.[/I][/SUB][/release][TABLE="width: 401, align: right"]
[/TR]
[/TABLE]
[/TD]
[/TR]
[/TABLE]
[release]
Cybersecurity Legislation
Senate Majority Leader Harry Reid, a Nevada Democrat, is compiling comprehensive cybersecurity legislation on his side of Capitol Hill. In the House, a task force of 12 Republicans led by Representative William “Mac” Thornberry of Texas is expected to send its cybersecurity recommendations to House Speaker John Boehner and Majority Leader Eric Cantor on Oct. 3.
Data breaches at Tokyo-based Sony Corp. and Citigroup Inc. have sharpened U.S. government scrutiny of how businesses protect consumer information and notify the public about cyber attacks. Sony was criticized by U.S. lawmakers including Representative Mary Bono Mack for taking six days to disclose an attack that exposed 100 million customer accounts and prompted the temporary shutdown of the company’s PlayStation Network.[/release]
[img]http://i.imgur.com/kOf6V.png[/img]
wat
[QUOTE=JWJ;32705712][img]http://i.imgur.com/kOf6V.png[/img]
wat[/QUOTE]
1337 hackers code their viruses with straight up binary
[QUOTE=Nexus435;32705744]1337 hackers code their viruses with straight up binary[/QUOTE]
Remember to be weary of anyone using the hacker os lunix and asking for an AMD processor
[QUOTE=Nexus435;32705744]1337 hackers code their viruses with straight up binary[/QUOTE]
Then create human shaped wireframe meshes in Blender.
translation:
"don't cut our budget we might be fucked!!!"
[editline]10th October 2011[/editline]
I mean legitimate concerns but even so
The best hackers used MIPS Technologies.
The best hackers would shave their heads, strap a wiimote to their monitor and go [b]FULL 3D CYBERSPACE CLUSTERBUNGLING.[/b]
Stuxnet already proved that hackers have the ability to do physical damage to infrastructure (although granted, it was rumored to be financed by a rival government). it's only a matter of time before someone makes another innovation like Stuxnet and does it again, and maybe this time no one will be in time to catch it.
[IMG]http://i.imgur.com/dIfh8.png[/IMG]
?
[QUOTE=Beetle179;32706592][IMG]http://i.imgur.com/dIfh8.png[/IMG]
?[/QUOTE]
Despite how hard you think that may be a 4, that's not a 4.
its a 2
they're getting more advanced
[QUOTE=Beetle179;32706592][IMG]http://i.imgur.com/dIfh8.png[/IMG]
?[/QUOTE]
It's okay Bender, two doesn't exist.
[QUOTE=Singo;32705702][img_thumb]http://www.sikharchives.com/wp-content/uploads/2010/04/cyber_hackers201.jpg[/img_thumb][/QUOTE][img_thumb]http://i56.tinypic.com/qyh9bo.jpg[/img_thumb]
As long as they don't hack the Gibson, America will be safe.
Super 1337 business bro~~
Obviously these hackers are so advanced they have virtual reality so they need wireframe models.
[QUOTE=markg06;32710350]Obviously these hackers are so advanced they have virtual reality so they need wireframe models.[/QUOTE]
and then Shodan was born