Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Anatomie eines Cyberwars
Stuxnet, Duqu und Flame – der virtuelle Krieg hat begonnen
Im
Entwickler Magazin 5.2012
ist ein Artikel zu Stuxnet und Co. erschienen - den ersten Waffen im
Cyberwar.
Links
Stuxnet
- [1] F-Secure: Espionage Attack Uses LNK Shortcut Files
- [2] Sophos: Windows zero-day vulnerability uses shortcut files on USB
- [3] VirusBlokAda: Rootkit.TmpHider
- [4] Kaspersky: Myrtus and Guava, Episode 2
- [5] Sophos: W32/Stuxnet-B
- [6] Kaspersky: Myrtus and Guava, Episode 3
- [7] Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code Execution
- [8] Microsoft Malware Protection Center: The Stuxnet Sting
- [9] F-Secure: More Analysis of Case LNK Exploit
- [10] Sophos: Yes, there's malware. But don't change your SCADA password, advises Siemens
- [11] Siemens: SIMATIC WinCC / SIMATIC PCS 7: Information about Malware / Viruses / Trojan horses
- [12] ISC Diary: Preempting a Major Issue Due to the LNK Vulnerability - Raising Infocon to Yellow
- [13] Microsoft Security Response Center: Security Advisory 2286198 Updated
- [14] ISC Diary: Lowering infocon back to green
- [15] Microsoft Security Response Center: Out of Band Release to address Microsoft Security Advisory 2286198
- [16] Microsoft Malware Protection Center: Stuxnet, malicious .LNKs, ...and then there was Sality
- [17] Microsoft Security Bulletin MS10-046 - Critical: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)
- [18] Symantec: Stuxnet Introduces the First Known Rootkit for Industrial Control Systems
- [19] Symantec: W32.Stuxnet — Network Information
- [20] Kaspersky: Myrtus and Guava, Episode 4
- [21] Kaspersky: Myrtus and Guava, Episode MS10-061
- [22] Symantec: Stuxnet Using Three Additional Zero-Day Vulnerabilities
- [23] Symantec: Stuxnet Print Spooler Zero-Day Vulnerability not a Zero-Day at All?
- [24] ThreatPost: Microsoft Missed 2009 Published Article on Stuxnet-Type Attack
- [25] Symantec: W32.Stuxnet Variants
- [26] Symantec: Stuxnet Before the .lnk File Vulnerability
- [27] Symantec: Stuxnet Infection of Step 7 Projects
- [28] Sophos: Certified uncertainty
- [29] Symantec: Stux to be You
- [30] Symantec: Exploring Stuxnet’s PLC Infection Process
- [31] tehran times: Iran successfully battling cyber attack
- [32] sueddeutsche.de: Computer-Virus Stuxnet trifft deutsche Industrie
- [33] Wall Street Journal: Computer Worm Hits Iran Power Plant
- [34] Knowledge Brings Fear: stuxnet: targeting the iranian enrichment centrifuges in Natanz?
- [36] Symantec: Stuxnet: A Breakthrough
- [37] New York Times: Israeli Test on Worm Called Crucial in Iran Nuclear Delay
- [38] Marty Edwards, Todd Stauffer: Control System Security Assessments; 2008 Automation Summit (PDF)
- [39] Symantec: Updated W32.Stuxnet Dossier is Available
- [40] ISSSource: Stuxnet Loaded by Iran Double Agents
- [41] New York Times: Obama Order Sped Up Wave of Cyberattacks Against Iran
- [42] Kim Zetter: How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
- [43] ThreatPost: Report: Iran Resorts to Rip And Replace To Kill Off Stuxnet
- [44] Institute for Science and International Security:
a) Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?
(auch als PDF)
b) Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report
(auch als PDF)
- [45] Sophos: Stuxnet: How USA and Israel created anti-Iran virus, and then lost control of it
- [46] Kaspersky: The Day The Stuxnet Died
Duqu
Flame
Whitepaper und FAQ