Summary: Five years after Stuxnet first appeared we have a detailed analysis of its origin (at least, what's known to the public) in Kim Zetter's Countdown To Zero Day. Here C. Thomas reviews it, explaining Stuxnet's importance. Stuxnet is another American triumph (with Israel's help). We're now the first to use both of the revolutionary … Continue reading “Countdown To Zero Day” describes the new era of war, preparing you for the next attack.
Summary: In this last of Marcus Ranum's 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible -- no matter how confidently they're stated. Our difficulty with this is a common if scary aspect of modern warfare and crime. Article deleted at author's request. Copyright … Continue reading The horror of cyberspace: we can’t easily identify our attackers.
Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender's perspective, explaining the difficulty of attribution, written by our co-author Marcus Ranum. After reading this, you'll regard the news about these things more skeptically. Article deleted at author's request. Copyright © 2015, Tenable Network Security, … Continue reading How do we identify our attackers in cyberspace?