Nytro Posted January 22, 2013 Report Posted January 22, 2013 SecuREview magazineIt’s a definitive sign of the times when terms like “cyber-warfare”and “cyber-espionage” are creeping into computer news stories.And these aren’t just movie plots or an imagination runningwild. Military-grade malware are now creeping across corporatenetworks. Nation-state actors are investing heavily in the creationof tools to conduct cyber-warfare and we now have documentedcases of malware being used against critical infrastructure targets.In this issue, we feature two stories addressing this issue. CostinRaiu writes about the timeline related to Stuxnet and Duqu, themalware families that are clearly targeting Iran’s nuclear facilities.Raiu’s research shows clearly that Duqu and Stuxnet were createdby the same ‘owners’ with the main aim to spy on -- and eventuallysabotage -- Iran’s FEP at Natanz.Eugene Kaspersky’s call for the Internet to be a military-freezone is relevant when we take into account that fact that Duquwas created as early as 2007, when the people who manage criticalinfrastructure around the globe were clearly unprepared for thedangerous ramifications of military-grade malware gone rogue.As Eugene outlines, we are sitting on a powder keg. If a ‘cyberweapon’hits an unintended target, real lives could be at stake andcollateral damage could be devastating.Achieving a military-free Internet might not be possible but aclear understanding of the clear and present dangers is necessary.Stay secure!Download:http://www.secureviewmag.com/downloads/article_pdf/4th_quarter_secureview_small_file.pdf Quote