The Last HITB Security Conference in Malaysia

Hands-on Technical Trainings - 13th & 14th October

http://conference.hitb.org/hitbsecconf2014kul/#tile_schedule

Triple-Track Conference - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/conference-speakers/

 

Capture the Flag - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/capture-the-flag/

HackWEEKDAY - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/hackweekday/

CommSec Village - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/commsec-village/

REGISTER ONLINE NOW

The cyber war is real -- and our defenses are weak

http://www.flickr.com/photos/mysticpolitics/7619805526/

I used to think "cyber war" was the most overhyped security buzzphrase of all time. And it was -- until Stuxnet and APTs (advanced persistent threats) arrived. Now, as Bob Violino detailed in his recent InfoWorld article, all-out cyber war has begun.

The 2010 Stuxnet worm is arguably the most sophisticated, successful, and targeted malware of all time. Strongly linked to both Israeli and U.S. government teams, Stuxnet effectively interrupted the Iranian nuclear program. Make no mistake: When one government attacks another government's infrastructure, we are clearly at war, even though malware is the weapon of choice rather than missiles or boots on the ground.

In response to the Stuxnet attack on the Iranian nuclear program, an Iranian hacker has been quite successful at compromising multiple, trusted, public CA (certification authority) vendors. True, these weakly secured CAs have been hackable all along. The Iranian hacker took advantage of that fact, and after two decades of just a few digital certificates being compromised, we've had a wave of compromised CAs and hundreds of fraudulent certificates.

Tags: