New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 987
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image crkatk: Security HeadLines: Hackers Did Not Cause Blackout - Report image
Crack Attack
Hackers Did Not Cause Blackout - Report
By Brian Krebs
washingtonpost.com Staff Writer
Wednesday, November 19

There is no evidence that the blackout that struck the northeastern United States and southern Canada on August 14 was caused by hackers, but the power grid's reliance on the Internet makes it vulnerable to potentially devastating online attacks, according to a report issued Wednesday.

The U.S.-Canada Power System Outage Task Force concluded that the blackout was due to a combination of factors, including computer failures, human error, power grid rule violations and inadequate maintenance by FirstEnergy Corp., the Akron-based power company that serves northern Ohio.

The task force said analysis to date provides no evidence that malicious actors are responsible for, or contributed to, the outage. But the report noted that utilities are increasingly connecting their internal control systems to the global Internet to more easily monitor their networks from remote locations, a practice that exposes systems to a range of security risks.

The largest North American blackout in history took place two days after the Blaster worm infected hundreds of thousands of computers worldwide, leading some computer security experts to speculate that the malicious computer program caused or contributed to the power failure.

Such speculation was driven, in part, by the fact that the Slammer worm crashed computers at FirstEnergy's Davis-Besse nuclear power plant when it spread across the Internet in late January.

In June 2002, Washington Post reporter Barton Gellman reported that U.S. government security officials were growing concerned that terrorists would try to hijack vulnerable computer systems at utilities, dams and other infrastructure targets in hopes of causing widespread destruction. Officials told Gellman that they had monitored Internet traffic from East Asia and the Middle East that was directed at critical infrastructure systems, activity that was interpreted to be terrorists researching potential targets.

Utilities have long been targeted by hackers, according to Alexandria, Va.-based network security firm Riptech (now a unit of Symantec Corp.). Riptech said that its power and energy clients were targeted far more than any other industry sector last year: 70 percent of power and energy companies suffered at least one severe attack during the first six months of 2002, a 77 percent increase over the previous year.

Joseph Weiss, a consultant at Fairfax, Va.-based KEMA Consulting, said most U.S. power facilities now use some form of commercially available products to remotely monitor and control their distant networks and facilities. Yet, the vast majority of the nation's power plants and substations do not have the technology in place to detect electronic intrusions, Weiss said.

These systems are being networked over the Web because the power companies want the information from various facilities in real time, Weiss said. And that's starting to make them a lot more vulnerable than they were in the past.

Many of the back-end systems that control the physical switches in power plants are the very same products used in other industrial infrastructures, including water, oil and gas, chemical and metal refining, paper, pharmaceuticals, and food and beverage production, Weiss said.

That means if one of them is vulnerable, all of them probably are, he said.

The U.S.-Canada report concluded that the generation and delivery of electricity remains a target of people intent on disrupting the electric power system.


© 2003 TechNews.com
The full article is at WashingtonPostTech
Posted on Friday, 21 November 2003 @ 04:25:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· News.com
· HotScripts
· W3 Consortium
· More about Crack Attack
· News by phoenix22


Most read story about Crack Attack:
Beware Attacker from IP 200.55.7.235 and Whole 200.x.x.x Block

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register