Access your Pro+ Content below.
Talk of cyberwarfare threats heats up with Flame malware
This article is part of the Information Security magazine issue of July/August 2012
Security experts and researchers generally are unfazed by cyberattacks using malware designed to collect intelligence data because it’s a practice that’s been done for years, but most agree the real threat is attacks aimed at causing destruction. In the hands of the wrong people -- extremists out to cause chaos to make a statement regardless of the fallout -- cyberweapons are too difficult to control, they say. The Flame malware toolkit, which emerged recently, has sparked a renewed discussion of cyberwarfare threats. Researchers conducting analysis of the malware are trying to shed light on how and why it was used. All signs point to nation-state sponsored cyber-intelligence gathering, a practice that has been going on for decades, according to security experts, and it’s likely there is no end in sight. Flame is now also linked to the Stuxnet worm, which returned to the public eye recently after new details emerged connecting the attack -- designed to disrupt Iran’s nuclear program -- to a joint American-Israeli operation ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Learn pen testing best practices and how to build an internal pen testing team.
New techniques are emerging to help organizations analyze security data and improve security defenses.
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
Restricting user permissions, server hardening and dedicated service accounts are critical.
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
Columns in this issue
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
Government and private sector collaboration is critical to surviving in cybespace.
Breach at the professional networking site highlights password practices, storage procedures.