TITLE

A whole new can of worms

AUTHOR(S)
Robinson, David
PUB. DATE
November 2010
SOURCE
Process Engineering;Nov/Dec2010, Vol. 91 Issue 6, p8
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the danger poses by the computer virus Stuxnet in industries. It cites the personal computers at Iran's Bushehr nuclear plant and Siemens SCADA as the most widely reported attacks of Stuxnet. It notes that the virus manifest the increase in Internet fraud, computer hacking and data loss in the industrial and utilities sector. It mentions that employees should be aware of their Internet security habits to avoid any security incidents in their companies.
ACCESSION #
57196100

 

Related Articles

  • Information Security: 'ILOVEYOU' Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements: T-AIMD-00-171.  // GAO Reports;5/10/2000, p1 

    The "ILOVEYOU" computer virus is the latest in a series of events on the Internet that have seriously disrupted computer operations in both government and private industry. Although the federal government is working to implement mechanisms to help agencies ward off such an attack, it was not...

  • An Overview Of Virus Activity In 2003.  // Software World;Jan2004, Vol. 35 Issue 1, p22 

    Presents an overview of computer virus activity in 2003. Cases of major virus outbreaks; Details on the origin of the viruses; Information on the security measures taken to counter threats of virus activity.

  • Untitled. Ashford, Warwick // Computer Weekly;10/26/2010, p101 

    The article offers information on the use of enhanced version of the computer software Zeus Trojan for committing cyber crimes. According to researchers version 2.1 of the financial malware has added sophisticated mechanisms to commit online fraud. It also highlights the pressure that zeus...

  • Computers, Networks and Theft. Mashevsky, Yury // Software World;Nov2006, Vol. 37 Issue 6, p3 

    The article reports on cybercrime. According to Kaspershy Lab study, four types of virtual property that are often stolen include data needed to gain access to financial services and online auction sites, passwords to online games, passwords to mailboxes and instant messaging (IM) and website...

  • International Phishing Gang Busted By Police.  // Software World;May2006, Vol. 37 Issue 3, p24 

    The article reports on the arrest of the International Phishing Gang arrested by Germany's Federal Crime Office. German authorities known as BKA arrested seven men aged between 21 to 47 years old in connection with a plot to plunder the bank accounts of online surfers by spamming phishing emails...

  • Police and industry link up for centre to fight e-crime. Goodwin, Bill // Computer Weekly;8/29/2006, p4 

    The article reports on the collaboration of police, the information technology industry and universities to establish a national centre to advise firms to protect themselves against computer crime. The proposed centre, an alliance modelled on the Child Exploitation and Online Protection Centre,...

  • Craftier Web threats hit finance firms. Messmer, Ellen // Network World;3/15/2004, Vol. 21 Issue 11, p8 

    According to Symantec Corp.'s semiannual Internet Security Threat Report, there has been a fivefold increase in worms and other types of malicious code that attempt to steal personal data from Internet users during the last six months of 2003. Companies that process online financial transactions...

  • Is That a Bull's-Eye On Your Wallet? Sparks // Newsweek (Atlantic Edition);1/9/2006 (Atlantic Edition), Vol. 147 Issue 2, p8 

    The article looks at the rise of computer crimes. A German computer worm, called Sober, that sent out unsolicited electronic mail messages on the Inauguration Day for Germany's first female chancellor. This worm may be distracting attention from a more worrying trend: rising Internet fraud....

  • Net threats.  // Consumer Reports;Sep2007, Vol. 72 Issue 9, p28 

    The article reports on a variety of ways in which criminals use computers to garner information to perpetrate identity theft crimes as well as supplying information to aid consumers avoid such frauds. Phishing is a growing industry where cyber criminals imitate web sites from banks, employers,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics