Surely someone in the Slashdot community has access to a documented first sighti
ng of the term FAQ?
Please dig deep into your archives, and help the editors of the Oxford English D
Notice: Your tin foil hats may need to be turned in for bunkers against falling space debris.
Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures? Your opinions would be quite interesting. In the meantime, search for the hashtag #softwarepirateconfession on Twitter to see the many instances of this piracy feature operating and/or misfiring.
According to security researcher Michael Toecker (@mtoecker), a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums.
Toecker audited support sites like bleepingcomputer.com, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power’s EnerVista Software (used to configure GE electric power protection products).
The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. “With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,” Toecker wrote."
Jealous much, Samsung and Google?