Speaking at a Nation Press Club event in Canberra Australia, Russian security expert Eugene Kaspersky caused a stir when he informed reporters that the International Space Station (ISS) has been infected by malware.
Even though the ISS has no internet connection in a traditional sense the flow of human traffic provides the perfect vector for electronic viruses, especially the USB sticks and laptops that they bring. Apparently this is not an uncommon situation aboard ISS. In the early days a number of PC’s were running Windows XP and this was an issue, switching many of these machines to Linux has reduced the impact.
“The space guys from time-to-time are coming with USBs, which are infected. I’m not kidding. I was talking to Russian space guys and they said, ‘yeah, from time-to-time there are viruses on the space station,'” Kaspersky told reporters.
Continue reading International Space Station Infected by Malware, Cyber Weapons and Porn Pop Ups…
In this Internet connected world the FBI have had to expand the list of super villains that they are hunting down. The new generation of super villain is wired and connected, existing in the ethereal world of the internet as an avatar and making use of zombie machines to do their bidding. Not only do the FBI need to track down these crafty individuals but they are also tasked with cleaning up the mess left behind by these super villains. The by-product of this latest victory may drop 4 million machines off the internet in one day.
The FBI’s latest clean-up involves the DNSChanger Trojan. This sordid little tale begins with the arrest of six men in Estonia. The arrests were made in November with the Estonian authorities reporting that the six were suspected of using DNSChanger Trojan malware to redirect victims to malicious websites and block them from genuine security sites that might’ve removed the infection. There are at least four million computers infected by the trojan worldwide. Not just limited to home PC’s the trojan has also found its way onto many corporate machines.
Since the arrests the FBI has been working to identify the infected machines and directing the relevant ISPs to clean up the infections. The FBI currently has court orders allowing it to use its own DNS servers to track – in itself a form of hacking – the infection, this court order runs out on March 8. As you would imagine this is a slow and tedious job, and it has zero chance of being completed by March 8.
Continue reading The FBI prepares to Kill Zombie Trojan Network, 4 million PC’s Must Die!!!
Our understanding of the universe is expanding in all directions, expanding outwards as we see more and more of the cosmos and inwardly as we learn more about the nano world. In the nano world the tools for capturing the action shots are improving but there are still a number of destinations we are unable to explore. Organic organisms – for example, influenza virus – are too delicate for the standard tools of nano exploration. Powerful x-rays and laser illumination used in modern microscopes simply disintegrate such delicacies. In these situations scientists have been turning to simulations – computer models – for answers. Until now, studying viruses has been challenging in laboratories, this new technology not only allows for greater offline research, it belies the complexity associated with simulating billions of particles in the correct conditions to create such simulations
Dr. Ying Ren along with a team of researchers at the Chinese Academy of Sciences Institute of Process Engineering have also been searching for answers using simulators, in the process they have developed the Computational Microscope, a breakthrough in simulation technology.
Continue reading World First: Supercomputer H1N1 Flu Virus Simulated…
The world of espionage is full of twists and turns, plays and counter plays. In the latest twist, it was recently discovered that America’s most powerful surveillance tech gadgets, the Predator and Reaper UAVs – Unmanned Aerial Vehicles – have been infected by a keylogger virus. Discovered by the military’s Host-Based Security System the virus has made itself at home in the controller cockpits located at Creech Air Force Base at Indian Springs in Nevada. Most of the Afghanistan and Iraq are missions flown from Creech.
A defence official confirmed to CNN on Monday that the virus had infected the systems that control the drones but it hadn’t interfered with normal operations. Officials would not comment on the specific virus or how the virus had infected the systems.
The most likely source of infection seems to be the removable drives used to transfer data to and from the drones. The drones are in a sense debriefed upon their return, with all of the data collected during the mission unloaded to the removable drives. At some point the removable drives have been connected to the control systems, delivering it’s dangerous cargo. A persistent virus it is too, after each attempt at the cleaning process the virus seems to re-appear, even after 3 weeks the virus is still loitering away in the control system.
Continue reading UAV Predator Virus: When Drones Go Rogue…