Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 6 declined, 4 accepted (10 total, 40.00% accepted)

Submission + - Small Satellite Dish Systems Called Ripe For Hacking

The Walking Dude writes: Thousands of small satellite dish-based computer systems [VSATs] that transmit often-sensitive data from far flung locations worldwide – oil rigs, ships at sea, banks, and even power grid substations – are at high risk of being hacked, including many in the United States, a new cyber-security report has found.. These vulnerabilities can be exploited through Internet-connected computer networks, as hackers are more commonly envisioned to do, or through electronic warfare methodologies that more directly manipulate the radio waves of uplinks and downlinks.
Security

Submission + - Hacking Nuclear Command And Control

The Walking Dude writes: "The International Commission on Nuclear Non-proliferation and Disarmament (ICNND) has released an unclassified report exploring the possibility of cyber terrorists launching nuclear weapons. Ominous exploits include unreliable early warning sensors, unsecure nuclear weapons storage, transportation blunders, breaches in the chain of command, and the use of Windows on nuclear submarines. A traditional large-scale terrorist attack, such as the 2008 Mumbai attacks, could be combined with computer network operations in an attempt to start a nuclear war. Amidst the confusion of the traditional attack, communications could be disrupted, false declarations of war could be issued on both sides, and early warning sensors could be spoofed. Adding to this is the short time frame in which a retaliatory nuclear response must be decided upon, in some cases as little as 15 minutes. The amount of firepower that could be unleashed in these 15 minutes would be equivalent to approximately 100,000 Hiroshima bombs."
Security

Submission + - China Will Use Cyber Warfare To Leapfrog Foes (international-relations.com)

The Walking Dude writes: "A lengthy article published in Culture Mandala details how China is using cyber warfare as an asymmetric means to obtain technology transfer and market dominance. Case studies of Estonia, Georgia, and Chanology point towards a new auxiliary arm of traditional warfare. Political hackers and common Web 2.0 users, referred to as useful idiots, are being manipulated through PSYOPS and propaganda to enhance government agendas."

Slashdot Top Deals

Time is an illusion perpetrated by the manufacturers of space.

Working...