Stuxnet and Wikileaks were the top news last week. Questions still abound as to who created Stuxnet. Many believe that it was Israel, but now some are saying that it could be China.
And the intended target was not an Iranian power plant, but India’s space program.
The question remains though if Stuxnet attacks Windows based vulnerabilities, how is Iran even using the software, if Microsoft can’t export to Iran?
But what most experts will agree that the sophistication of Stuxnet fairly limits the country source of origin. Computer Security company Eset Security released an in-depth technical analysis (PDF format) of the cyber weapon called “Stuxnet Under the Microscope”.
Wikileaks does it again. But this time they released nearly 400,000 classified reports on the Iraq war. Wired.com had some great articles on the release. Superbombs and Secret Jails: What to Look for in WikiLeaks’ Iraq Docs talks about Iran’s involvement in the Iraq war. And thanks to Wikileaks, we now have proof that there were Weapons of Mass Destruction found in Iraq.
One would wonder how Wikileaks could get away with taunting the United States. In the past, Wikileaks used servers in a converted Swedish cold war nuclear bunker to host their data. But in a brazen move, recently used mirrors in not only Ireland and France, but also used Amazon.com in the US. The document release was not without incident though. According to one report, Wikileaks was hacked by a very skilled hacker prior to the publication.
Lastly, should cyber-attacks against a NATO nation trigger a physical response? If they are included in Article 5 of the North Atlantic Treaty they could, according to a Miller-Mccune article. NATO countries will discuss this next month at its annual conference. I just hope they take Russian Col. Anatoly Tsyganok comments to heart when they do, “These attacks have been quite successful, and today the alliance has nothing to oppose Russia’s virtual attacks.”
Other Top Stories from Around the Web:
Iranian Cyber Army providing botnet for rent
It appears the group of cyber attackers who recently went after Twitter and Baidu are running a for-rent botnet.
Google admits to accidentally collecting e-mails, URLs, passwords
According to Google, data was mistakenly collected in more than 30 countries, including the United States, Canada, Mexico, some of Europe, and parts of Asia.
Federal government grapples with cybersecurity staff shortage
The US federal government is facing a severe shortage of cybersecurity staff, according to a panel of cybersecurity experts.
Cyber Crime and Information Warfare: A 30-Year History
What follows are some highlights in the 30-year history of hacking and information warfare.
Firesheep addon allows the clueless to hack Facebook, Twitter over Wi-Fi
Now any person, or idiot, can use Firesheep to scan local Wi-Fi networks and find users who are logged into Facebook, Twitter, Amazon, Google, FourSquare, Dropbox, Hacker News, Windows Live, Cisco, Evernote, WordPress, Flickr, bit.ly and many other services.