-
Non_Toxic_Kids
-
City's 'All Green' Stormwater Plan Raises Eyebrows at EPA
“City's 'All Green' Stormwater Plan Raises Eyebrows at EPA - http://nyti.ms/7pmO3I”There is a great deal of built plant to be replaced.Cities have spent freely to de-water their subsoil.Sealevel is rising inexorably.Build the tree pits.Separate the storm and sanitary drains.Build the treatment facility in Camden. Size it for the city of today.The city is shrinking.
-
-
jrmoreau
-
Top World Cup Players on Facebook, Day by Day
“Top World Cup Players on Facebook, Day by Day - http://nyti.ms/b1WPjc”I am not a fan.
-
-
Wilhelmina Sims
-
Utah Law Encourages Gold and Silver Coin Use
“Utah Law Encourages Gold and Silver Coin Use - http://nyti.ms/mHplNN”Utah hasn't the power.http://markets.on.nytimes.com/research/markets/commodities/commodities.asp
-
-
merqueen234
-
YouTube's Next Stars
“Check out YouTube's Next Stars - http://nyti.ms/kHuOdH”Absolutely no interest.I will run any single performance you wish.
-
-
Sasha Koren
-
Showing Gay Teens a Happy Future
A new online video channel is reaching out to teenagers who are bullied at school for being gay. The message: life really does get better after high school.Sooner is better. ------------- As soon as you can is best.
-
-
laurenahayes
-
Stuxnet Worm Used Against Iran Was Tested in Israel
“Stuxnet Worm Used Against Iran Was Tested in Israel - http://nyti.ms/gfHRXE”http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.htmlhttp://slashdot.org/index2.pl?fhfilter=stuxnetPentagon Says Cyberattacks Can Count As Act of War 227
Posted by Soulskill
from the now-we-can-invade-anybody dept.suraj.sun tips news that the Pentagon has decided computer sabotage originating from another country can be classified as an act of war. "The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to US nuclear reactors, subways or pipelines as a hostile country's military." This news comes only days after the Chinese military admitted the existence of a team of cyberwarriors. "The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the US can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military."New Siemens SCADA Vulnerabilities Kept Secret, Says Schneier 119
Posted by Roblimo
from the watch-those-centrifuges-spin-out-of-control dept.From the article: SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fears multiply. It's not bad guys deleting your files, or getting your personal information and taking out credit cards in your name; it's bad guys spewing chemicals into the atmosphere and dumping raw sewage into waterways. It's Stuxnet: centrifuges spinning out of control and destroying themselves. Never mind how realistic the threat is, it's scarier." What worries Bruce Schneier most is that industry leader Siemens is keeping its SCADA vulnerabilities secret, at least in part due to pressure from the Department of Homeland Security .DHS Chief: What We Learned From Stuxnet 125
Posted by CmdrTaco
from the can't-wait-for-finals-week dept.angry tapir writes "If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies (CT: Warning, site contains obnoxious interstitial ads. Blocker advised), according to the head of the US Department of Homeland Security. When Stuxnet hit, the US Department of Homeland security was sent scrambling to analyze the threat. Systems had to be flown in from Germany to the federal government's Idaho National Laboratory. In short order the worm was decoded, but for some time, many companies that owned Siemens equipment were left wondering what, if any measures, they should take to protect themselves from the new worm."Iran Says Siemens Helped US, Israel Build Stuxnet 300
Posted by Soulskill
from the fair-and-balanced dept.CWmike writes "Iran's Brigadier General, Gholam Reza Jalali, accused Siemens on Saturday with helping US and Israeli teams craft the Stuxnet worm that attacked his country's nuclear facilities. 'Siemens should explain why and how it provided the enemies with the information about the codes of the SCADA software and prepared the ground for a cyber attack against us,' Jalali told the Islamic Republic News Service. Siemens did not reply to a request for comment on Jalali's accusations. Stuxnet, which first came to light in June 2010 but hit Iranian targets in several waves starting the year before, has been extensively analyzed by security researchers. Symantec and Langner Communications say Stuxnet was designed to infiltrate Iran's nuclear enrichment program, hide in the Iranian SCADA (supervisory control and data acquisition) control systems that operate its plants, then force gas centrifuge motors to spin at unsafe speeds. Jalali suggested that Iranian officials would pursue Siemens in the courts, and claimed that Iranian researchers traced the attack to Israel and the US. He said information from infected systems was sent to computers in Texas."40th Anniversary of the Computer Virus 60
Posted by Soulskill
from the over-the-hill dept.Orome1 writes "This year marks the 40th anniversary of Creeper, the world's first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances boom from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. Besides sheer quantity, viruses, which were originally used as academic proofs of concept, quickly turned into geek pranks, then evolved into cybercriminal tools. By 2005, the virus scene had been monetized, and virtually all viruses were developed with the sole purpose of making money via more or less complex business models."Australia Creates Cyberwarfare Unit 60
Posted by timothy
from the sir-shall-I-adjust-the-budget-sir dept.An anonymous reader writes "Australia's Federal Government computer emergency response team and other spy agencies are teaming up to create a cyberspooks unit to counter threats from other countries, the nation's chief lawmaker said last night. In a speech referencing Stuxnet and GhostNet, Attorney-General Robert McClelland said the unit would protect sensitive Australian Government and business information from espionage by the nation's foes. Recently new powers were handed to spymasters to deal with the enhanced security threat that the Greens party said were 'excessive.'"Iran Claims Two New Supercomputers 110
Posted by CmdrTaco
from the good-thing-we-don't-export-crypto dept.dcblogs writes "Iran President Mahmoud Ahmadinejad announced development of two supercomputers Wednesday. Iranian government news media published a photo spread of one the systems it claims is capable of 89 teraflops, which is far short of the petascale systems in the US and China. There's no independent verification of Iran's claim. But after the Stuxnet attack, Iran may be trying for an IT comeback via supercomputing or just trying to show it is in control as regional unrest spreads. Iran says the new systems will make the global Top 500 supercomputing listing, but it hasn't submitted a Linpack benchmark to the list organizers."Stuxnet's Legacy: Get Back to Basics or Get Owned 162
Posted by samzenpus
from the all-your-files-are-belong-to-us dept.Gunkerty Jeb writes "Attacks such as Stuxnet, Operation Aurora or GhostNet are not what most enterprises and organizations need to be worried about. The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies."On Retirement, Israeli General Takes Credit for Stuxnet Attacks 334
Posted by timothy
from the all-in-all-it's-been-a-good-run dept.dinscott writes "Last month, The New York Times ran a story about Stuxnet having been developed by the Americans and the Israelis as a part of a joint project, but it was based on claims by confidential sources. It now seems that the information from these sources was correct. The Haaretz — Israel's oldest daily newspaper — reports on a surprising video that was played at a party organized for General Gabi Ashkenazi's last day on the job."Obama Wants Big Hike In Cybersecurity Research 73
Posted by CmdrTaco
from the i-feel-safer-already dept.dcblogs writes "The White House 2012 budget seeks a 35% increase to $548 million in cybersecurity research and development, including funds to help DARPA mitigate the risk of insider threats. Think WikiLeaks. Improving control system security, post Stuxnet, was also cited as priority. Overall, the budget seeks $66.1 billion for basic and applied research across all areas, an 11.6% increase. Some areas called out for special focus by the White House include robotics. The feds have already started offering grants for developing of 'co-robots,' which are 'systems that can safely co-exist in close proximity to or in physical contact with humans in the pursuit of mundane, dangerous, precise or expensive tasks.' The US also wants to focus research on nanomanufacturing, 'and the merging of self-assembly with lithography to achieve large-scale predictable placement of nanoscale components.'"Stuxnet Struck Five Targets In Iran 59
Posted by CmdrTaco
from the behind-the-scenes dept.Batblue writes "Researchers at Symantec said that the notorious Stuxnet worm targeted five separate organizations, and attacks against those objectives — all with a presence in Iran — started in June 2009, more than a year before independent experts raised the alarm."Anonymous Claims Possession of Stuxnet Worm 234
Posted by timothy
from the now-they-can-really-damage-your-nuclear-program dept.An anonymous reader writes "Last night, a member of hacker group Anonymous announced on Twitter that the group was in possession of the Stuxnet worm. Recently, Anonymous has been in the news for its high profile attacks on software security firm HBGary, after Aaron Barr, the CEO of HBGary's sister firm HBGary Federal, claimed to have acquired the names of senior Anonymous members and threatened to release them to the public. This is where the possibility for Anonymous getting its hands on Stuxnet increases."Iran Launches Cyber-Police Units 45
Posted by Soulskill
from the defending-against-stuxnet-and-freedom dept.Khopesh writes "Iran is implementing a cyber police force to combat social networks and similar sources of 'espionage and riots.' This will likely result in more control over internet access than efforts that might hinder attacks like Stuxnet. 'Ahmadi Moghaddam said that Iran's cyber police will take on the "anti-revolutionary" dissident groups that used online social networks to organize protests against President Mahmoud Ahmadinejad following disputed elections held in 2009. "Through these very social networks in our country, anti-revolutionary groups and dissidents found each other and contacted foreign countries and triggered riots," said Ahmadi Moghaddam, referring to the protests that took place at the time.'"Compromised Government and Military Sites For Sale 51
Posted by Soulskill
from the your-tax-dollars-at-derp dept.Khopesh writes "Imperva blogged today about the sale of compromised .gov, .mil, and .edu sites, illustrating that cyber-criminals are getting bolder. Krebs on Security has an unredacted view of the site list. Perhaps the biggest threat is yet to come; if an industrious criminal can break into top government and military sites, so too can government-backed teams, proving that GhostNet and Stuxnet are just the beginning."Stuxnet Authors Made Key Errors 228
Posted by CmdrTaco
from the sorry-about-that dept.Trailrunner7 writes "There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that they've been mythologized to be in the media. In fact, some experts say that Stuxnet could well have been far more effective and difficult to detect had the attackers not made a few elementary mistakes."GE Venture Will Share Jet Technology With China 266
Posted by Soulskill
from the send-them-the-tsa-while-you're-at-it dept.vbraga writes "This week, during the visit of Chinese president Hu Jintao to the United States, GE plans to sign a joint-venture agreement in commercial aviation that shows the tricky risk-and-reward calculations American corporations must increasingly make in their pursuit of lucrative markets in China. GE, in partnership with a state-owned Chinese company, will be sharing its most sophisticated airplane electronics (NYT reg. required, reg.-free alternative here), including some of the same technology used in Boeing's new state-of-the-art 787 Dreamliner."Threat of Cyberwar Is Over-Hyped 123
Posted by Soulskill
from the let's-stick-to-normal-levels-of-hype dept.nk497 writes "A new OECD report suggests the cyberwar threat is over-hyped. A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them, and that sub-state actors such as terrorists and individual hackers can't really do much damage. Dr. Ian Brown said, 'We think that describing things like online fraud and hacktivism as cyberwar is very misleading.'"New York Times Reports US and Israel Behind Stuxnet 406
Posted by timothy
from the alleged-shooter dept.Oxford_Comma_Lover writes "Confirming heavy speculation in the Slashdot community, the New York Times reports that joint US-Israeli efforts were almost certainly behind the recent Stuxnet attack on Iran's nuclear program." The article stops just short of saying in so many words that Israeli is the doer, but leaves little doubt of its conclusion.Did Stuxnet Take Out 1,000 Centrifuges At Natanz? 189
Posted by timothy
from the down-for-routine-maintenance dept.AffidavitDonda writes "In late 2009 or early 2010, Iran decommissioned and replaced about 1,000 IR-1 centrifuges in the Fuel Enrichment Plant (FEP) at Natanz, implying that these centrifuges broke. Iran's IR-1 centrifuges often break, yet this level of breakage exceeded expectations and occurred during an extended period of relatively poor centrifuge performance. Although Iran has not admitted that Stuxnet attacked the Natanz centrifuge plant, it has acknowledged that its nuclear sites were subject to cyber attacks."A Finnish-Chinese Connection For Stuxnet? 113
Posted by timothy
from the fusion-cuisine dept.Lingenfelter writes "I recently wrote a white paper entitled 'Dragons, Tigers, Pearls, and Yellowcake' in which I proposed four alternative scenarios for the Stuxnet worm other than the commonly held assumption that it was Israel or the US targeting Iran's Bushehr or Natanz facilities."
-
- esPeople recommended a user:May 29, 2011
mpesce
-
Congressman Says Hacker Sent Lewd Photo From His Account
“Congressman Says Hacker Sent Lewd Photo From His Account - http://nyti.ms/iK4ESg <- 2011 is Teh Year of Teh H4ck0rz”Truth, at least for the moment.
-
-
vlamers
-
Against Learned Helplessness
“Amazing solution oriented article. Makes me proud to have his signed book! Against Learned Helplessness - http://nyti.ms/k5MEjv”Louder, LOUDER!
-
-
Technology Provides an Alternative to Love.
Our infatuation with technology encourages shallow self-reflection, and liking, rather than the harder work of loving.I will happily forgo the social part of the net for love. Mail and search and look up I would like to keep. -
WorkEcology
-
Spending Bill Clears Military Use of High-Carbon "Liquid Coal"
“Hmm...Have we really thought this through? -- Spending Bill Clears Military Use of High-Carbon "Liquid Coal" - http://nyti.ms/msUpWR”
What a very bad idea.
-
444444444444444444444444444444444444444444444444444444444444
-
JosephKapsch
-
New Life for Hollywood Reporter Under Janice Min
“New Life for Hollywood Reporter Under Janice Min via @NYTIMES http://nyti.ms/mQnJKw”I went through this in detail. Good for her. I will ignore it as I do so many things.
-
-
beinwal
-
Record Snowpacks Could Threaten Western States
“Record Snowpacks Could Threaten Western States - http://nyti.ms/invZZg”Melting now.http://www.wunderground.com/severe.asp?region=nw&setprefs.0.key=SVRMAP&setprefs.0.val=nw#gotoMaphttp://www.wunderground.com/maps/us/Temperature.html?MR=1
-
-
gjack
-
How Obama Came to Plan for ‘Surge’ in Afghanistan
“Amid the endless commentary, an increasingly rare thing -- some real reporting: Obama's Afghanistan deliberations - http://bit.ly/4C4VTB”You sort it out. I think that sooner out is sooner ended.http://topics.nytimes.com/top/news/international/countriesandterritories/afghanistan/index.html?scp=1-spot&sq=afghanistan&st=cse
http://topics.nytimes.com/top/news/international/countriesandterritories/pakistan/index.html?scp=1-spot&sq=pakistan&st=cse
-
-
howard53545
-
A Ballplayer. A Bookworm. A Killing.
“A Ballplayer. A Bookworm. A Killing. - http://nyti.ms/lcOevi A tragic story, two kids, one dead, other charged wit murder, their story”Accidental death, manslaughter at most. The prosecutor will go for second degree murder.
-
-
kimberlystrom
-
Tablet Apps Offer a Catalog Feel
“Tablet Apps Offer a Catalog Feel - http://nyti.ms/kcTdjb @thefind @kaplowpr”Every merchandising website does that.
-
-
sharcopter15
-
Could Conjoined Twins Share a Mind?
“Could Conjoined Twins Share a Mind? - http://nyti.ms/m9YBhA RT holy fucking what???”If they do share a mind should I care? If so why?Gym class will be interesting.swimming?Polygamy is frowned on in our culture . . .End of life?
-
-
MissNyle
-
‘Single Ladies,’ Drama, Begins on VH1 - Review
“‘Single Ladies,’ Drama, Begins on VH1 - Review - http://nyti.ms/m3yy85 @nytimes”It is of small interest to me. If the blinking lights amuse you . . .
-
-
-
Online Personalization Creates Echo Chamber to Affirm Biases
“Online Personalization Creates Echo Chamber to Affirm Biases - http://nyti.ms/jXHzAL. Often we do this to ourselves http://amzn.to/iF9qOU”Yes, that is personalization's point. The presentation will go on to attach a product or service to the echo chamber.
-
-
ed
The Latest. No information