Stuxnet Worm Claimed To Be Devastating In Iran 390
sciencewatcher writes "At debka.com, a website associated with intelligence communities focusing on the Middle East, the claim is made that Tehran this week secretly appealed to a number of computer security experts in West and East Europe with offers of handsome fees for consultations on ways to exorcise the Stuxnet worm spreading havoc through the computer networks and administrative software of its most important industrial complexes and military command centers."
So what's the word, people. (Score:5, Interesting)
Do you think the US did this in an official capacity, an "official" capacity, or had nothing to do with it?
Re:So what's the word, people. (Score:5, Funny)
No, they didn't. Proof: it worked.
Re:So what's the word, people. (Score:4, Interesting)
You might want to read about a similar feat performed by the U.S. Government here [zdnet.co.uk]
Re:So what's the word, people. (Score:5, Insightful)
Doesn't really matter either way...
Iran was grossly negligent in allowing their critical infrastructure to run on software controlled by a hostile government (and which they most likely had to pirate because there are export restrictions against iran).
Re:So what's the word, people. (Score:5, Informative)
(and which they most likely had to pirate because there are export restrictions against iran).
For the US -- there's nothing stopping me selling computer software to Iran, unless that software is of military/nuclear/etc use (you can see the full details of what's not allowed here (the PDF) [businesslink.gov.uk]).
Re:So what's the word, people. (Score:5, Insightful)
Re:So what's the word, people. (Score:5, Informative)
Crypto in U.S. law was removed from the munitions classification back in 1996 by then President Clinton.
Shortly thereafter one of the exemptions granted was for open source. If the source code was freely available, you don't need an export license.
Re:So what's the word, people. (Score:5, Insightful)
Clinton issued an executive order placing cryptographic software under the dominion of the Commerce Department with regards to export, and the Commerce Department simplified export rules to make things easier. However, they can always take it back, its not law, just policy.
Re: (Score:3, Insightful)
The issuing of executive orders (i.e. making law) is unconstitutional.
Some people have this opinion. However, that has not been the position of the courts or congress. in fact this practice has happened since at least the beginning of the nineteenth century (possibly 18th as well... they didn't keep records of exec orders until mid 20th century I think). Thus the rest of your statement is meaningless.
Who died and made you... (Score:3, Funny)
Re:So what's the word, people. (Score:4, Insightful)
So... its unconstitutional for the Chief Executive to issue an Executive Order to Executive Branch agencies, telling them how he thinks they should act, within their Legislatively mandated authority to craft details of policy implementation within the scope of the legislation in question?
Just because its a bitch move doesn't make it unconstitutional.
Re: (Score:3, Insightful)
You are 100% wrong.
http://legal-dictionary.thefreedictionary.com/Executive+Order [thefreedictionary.com]
I refer you to the following:
Re:So what's the word, people. (Score:4, Insightful)
Um, no.
The executive branch was granted the power, by Congress, to make rules and regulations about exporting munitions. Previous administrations put the entirety of that power under the State Department, which had really strict rules. Clinton's order just move encryption under the Commerce Department instead of the State Department, and the Commerce Department is a lot less paranoid. (Other munitions are still under State.)
I love how people have heard about Bush's illegal signing statements, learn they are like 'executive orders', and now presume all executive orders are illegal.
Executive orders, and signing statements, (which are just executive orders that get carried along with bills), are mostly used for the president to decide things that are left for him to decide under the law.
Congress gives the President a budget and the power to do something, he signs the bill and writes an executive order (Or attaches a signing statement to the bill as he signs it, so it will always be with that bill.) making an Office of Doing That Thing in the Department of Whatever, and gives them the money.
Executive orders are just public statements of policy that the executive branch must follow, they are not 'laws', and they move power around within the executive, they don't give the executive any power.
Bush, of course, did a lot of nonsense, things like signing a bill into law and, at the same time, asserting that no one has to follow it. This was obviously bad.
But you really need a basic civics lesson about how the executive works and about how Congress gives it powers. Very often, Congress gives 'regulatory power' over things to the executive, along with a few specific regulations, and the executive branch is in charge of figuring all that out, because you don't want the damn Congress figuring out licensing fees from a Chicago TV station or what roads to build in a national forest. Congress gives the executive branch the power to figure that out, and the President writes orders putting that power under the FCC or the National Parks Service.
Of course, often Congress does specify where in the executive branch things go, and even creates new offices, which the president cannot override. This is generally frowned upon at levels lower than cabinet positions....Congress creates the top level Departments, and maybe one level below that, but generally shouldn't be micromanaging within the offices, as it makes any sort of reorganization difficult. I.e., they create the Department of Homeland Security, and put the FBI (and others) within it, and assign specific crimes for the FBI to handle...but they shouldn't really be creating offices in the FBI to handle those crimes. (Because, over time, crimes change, and the FBI might find itself with one nearly empty office and one overworked one. I mean, at one time it would have made sense to have a 'train robbery' division.)
Congress can do that, though, legally. They just shouldn't, and don't, so it's up to the president to issue executive orders.
Re: (Score:3, Informative)
Re:So what's the word, people. (Score:5, Informative)
Re: (Score:3, Informative)
Microsoft is an American company. Hence, US export restrictions apply to Microsft Windows - irrespective of where you happen to be.
Microsoft can't export it, and others can't buy it from Microsoft and then export it to Iran without also violating US law. Now those non-US folk mightn't care about that (though once the US supplier finds out they can't keep legally keep supplying), but it does violate the licensing on the software from Microsoft and hence all copies of Microsoft Windows do not have valid licen
Re: (Score:2)
Re: (Score:3, Insightful)
So they should have built their own software to run on S7 PLCs? What country that you know of does that? Do you know of any country that does? If so name them, because I've been to dozens and never seen anything of the sort.
They could have probably run a lot of their automation with relay logic, but at a significantly increased cost.
Re: (Score:3, Insightful)
built their own software to run on S7 PLCs
To be fair, were not at a hostile level with Germany, so we may not have the same level of concern, for a foreign based software ownership (Siemiens)
It is fair to say the PLC's don't have to be always accessible from windows computers, Can be disconnected after verified... That connection is likely for SCADA (data logging/monitoring protocol to the S7), which is available for other operating systems.
A quick search shows these guys, among others:
http://www.modcomp.com/scada/scada_app.html [modcomp.com]
So it does seam for
Re:So what's the word, people. (Score:4, Insightful)
If Stuxnet is attacking Iran, I'd bet on Israel (just) ahead of the US.
Re: (Score:3, Insightful)
So would I, but I'd put Israel way ahead. However, I don't discount the possibility that no government was involved.
Re:So what's the word, people. (Score:5, Insightful)
The catch with the whole theory of a software hack, the stuxnet worm is far too tightly tied to Iran, hardware is far more likely to be the culprit rather than software. So hardware infrastructure in Iran, well if it was sourced from China or Russia likely safe, except of course in companies head quartered elsewhere were involved.
So access to windows source and Siemens PLC seems a must, so the really only leaves two suspects. Now if the worm in industrials plants result of industrial accidents that kill people, then clearly it would be an act of war, which would be pretty stupid because there are far more effective means of crippling infrastructure with far more primitive methods.
Re:So what's the word, people. (Score:4, Insightful)
> So access to windows source and Siemens PLC seems a must...
I see no need for access to Windows source, and anyone can buy the Siemens hardware.
Re:So what's the word, people. (Score:5, Interesting)
So access to windows source and Siemens PLC seems a must, so the really only leaves two suspects.
Actually, access to Window's source absolutely does not seem a must. But regardless, obtaining it is likely trivial. I know I've seen references to it on the net before. Any student and/or spy attending any number of various universities have access to it. Accordingly, it has been periodically freed on the Internet.
You're also missing the fact that Iranians themselves have reason to do this type of thing. Iranians, on average, are far more educated than the average American. Lots work in industry. They likely have no shortage of people who are fully capable and qualified to pull off such worms. Not to mention, politically speaking, they have almost endless justification.
If you want to be honest about it, the Iranian people themselves are the number one group which have reasons to pull this off. Next are the Israelis, followed by other surrounding Arab nations, Europe, and then lastly the US, followed by lots of smaller, less interested parties.
People seem to be in a hurry to forget that with the fall of Iraq, Iran now has center stage for regional power and authority. This is absolutely not acceptable to other Arab countries in the region.
Re: (Score:3, Interesting)
well said, with very minor nitpick: s/other Arab/Arab/ - whether Iraq is an Arab country (or Persian country) depends on who you ask, but I don't know of anyone with any knowledge of Iranian history who would call Iran an Arab country.
I have no knowledge of who's responsible for the worm, but Steve Bellovin wrote about it very intelligently [columbia.edu].
Re: (Score:3, Interesting)
Now if the worm in industrials plants result of industrial accidents that kill people, then clearly it would be an act of war, which would be pretty stupid because there are far more effective means of crippling infrastructure with far more primitive methods.
Not if it is built into the side of a mountain, like, say, a nuclear fuel processing plant.
Re: (Score:3, Insightful)
Re:So what's the word, people. (Score:5, Insightful)
Well given that they're running Windows for critical infrastructure & military command centers - apparently without AV, I'd say that yes, they did do it to themselves.
Re:So what's the word, people. (Score:5, Informative)
For example this story [ynetnews.com], note that its from 2009 but still make a pretty good description of how stuxnet works. Google or following the links on stuxnet news stories will bring up other possible links to Israel.
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
It's been brought up in pretty much every single discussion of this I've seen so far.
A communications disruption (Score:2)
A communications disruption can mean only one thing - invasion.
well, what better time to fix that pesky reactor.
why don't they (Score:2, Funny)
why don't they just use firefox instead of ie??
Re:why don't they (Score:4, Informative)
Or computer systems certified for safety-critical installations, instead of Windows which flat out says not to use it for that in the EULA?
Re:why don't they (Score:5, Informative)
interesting (Score:2)
the only problem with this contract is just how much of a target one can become if one decided to go for the money and the fun of 'exorcising' the demon from the nuclear power plant (and whatever else) systems.
I guess... (Score:2, Funny)
...it really stux to be iranian.
Does it run on Linux? (Score:2)
Does it run on Linux? For once a relevant question... ;)
Re: (Score:2)
The worm? "...Windows-specific..."
Re: (Score:2)
It doesn't. It's Windows-only and is typically first inserted through an infected USB stick after which it can spread throughout an internal LAN.
Anyone else find that site a litte skeevy? (Score:3, Interesting)
Treat anything from Debka cautiously (Score:5, Informative)
This site has a lot of seemingly tantalizing information, but a lot of it is BS. It reported that one of Saddam's palaces had huge glass covered aquariums where sharks would swim under your feet. Now that all the palaces have been 'visited', there have been no reports of any such thing.
Re: (Score:2)
Well that explains it. They must have actually been at SeaWorld [seaworld.com] (except there the sharks swim over you, make your own 'in soviet russia' style joke) and just fudged their expense report.
Re: (Score:2, Informative)
Re:Anyone else find that site a litte skeevy? (Score:5, Funny)
Getting technical information from Debka is like getting your foreign affairs info from the New York Daily News.
Perhaps it's just me... (Score:3, Insightful)
But I'm having a really hard time getting upset over the Iranian government being brought to a crawl by a computer virus. These ARE the same people that have made no bones about wanting to commit genocide against all Jews, and have tortured and murdered millions of their own people.
Personally, I hope it causes a total collapse. Perhaps then the Green Revolution people (those that are still alive, anyway) can have a chance at creating a true Democracy in Persia. The Persian people certainly deserve it.
What DOES worry me is that this is, in some ways, a "genie out of the bottle" moment. Formal "Weaponized" use of a computer virus to attack a state. While I'm sure it was inevitable, it is still a bit of a shock to know that the day has arrived.
All the more reason to be sure to be using a variety of redundant and disparate OS types to support your infrastructure I guess.
Re: (Score:2, Insightful)
Re:Perhaps it's just me... (Score:5, Interesting)
Any modern-day reactor should have an out-of-band method of SCRAMing [wikipedia.org] that doesn't rely on computer control of any sort. A common approach is to have control rods held physically over the nuclear fuel by electromagnets. If power is cut to the electromagnets for any reason then gravity drops them into place and the reaction ceases. If monitoring systems don't automatically cut power to the SCRAM system then it would just take a worker pushing a button. Heck, they may even have fuses located around the reactor that would melt in the presences of excessive heat or the presence of radiation, causing power to the magnets to be cut. So the likelihood of a computer worm causing a meltdown is highly unlikely unless the Iranians are stupid enough to disable the SCRAM system.
Also (Score:5, Informative)
Most modern reactor designs have a difficult time going critical. They are made such that if coolant goes away, they stop working. Depending on the kind of fuel you use you can set it up so that when the coolant goes away the excess heat causes things to spread out and thus the reaction slows. It gets hot, but not hot enough to melt down. Not fool proof, nothing is of course, but makes it pretty hard for things to go critical even in a worst case scenario.
It also should be noted that often the SCRAM systems go beyond that. The rods will have springs behind them to force them in quicker, and there are usually secondary systems to drive them in as well, should the primaries fail.
Over all, the world did a pretty good job learning from the problems of early reactors and it is pretty hard to cause a meltdown these days, with a modern reactor design at least.
Do remember that the people who build these have a large vested interest in making sure they DON'T go critical, even in adverse situations. Safeties are taken seriously.
Re:Also (Score:5, Informative)
All power reactors in the world today go critical as part of their normal operation. That's why they can sustain a chain reaction. However, they are all designed in such a way that their criticality is not sufficient to allow the reactor to remain critical without the contribution from so called delayed-neutrons. These are neutrons emitted by the fission products some time after the fission event. It's because the release of these neutrons is much slower than the release of fission neutrons that it is possible to build a stable nuclear reactor. Without them the reactor would either be sub-critical and hence not produce any power without an external neutron source, or it would be prompt-critical, which pretty much means you would not be able to control the rate of the chain reaction rapidly enough to prevent dangerous power fluctuations.
Modern pressurized water reactors typically can't go prompt critical, since the quantity of relatively low enriched uranium is too small.
Re: (Score:2)
Re:Perhaps it's just me... (Score:4, Interesting)
Too bad, so sad. Beats a nuclear war between Israel and Iran.
You're frighteningly insane. If you think this would PREVENT a nuclear war, you need to think it through again.
1) Domestic reactors go Chernobyl due to well known virus
2) Source of virus is established, either credibly or not
3) Iran petitions the UN for military retribution/economic restitution/etc, and it get vetoed
4) Everyone chooses sides and WWIII begins
This isn't even close to being far-fetched. And before we assume '4' results in 'Iran vs Everyone', do understand that going against Iran means going against the freedom to live in something other than a third world nation. Power is relatively essential, and all things considered this virus is of a TERRORISTIC nature because it seeks to attack the civilian infrastructure to achieve political goals. Do you really to side with the terrorists?
Re: (Score:2)
Well, here we have someone who certainly likes to swallow his propaganda whole.
Re: (Score:2, Insightful)
Re: (Score:2)
Dear Coward, take note:
1) Your tone is horrendous. There are certainly a large number of people who will assume that the link you're offering is the same kind of angry, insulting tripe with which it is surrounded.
2) Your link could well be one of the most enlightening things on youtube. I'm going try to verify that it is true independently before deciding, but this could be bigger than Pat Tillman.
My advice to you is to tone down the bullshit, and stick to the salient, intelligent points being made. This
Re: (Score:3, Informative)
My Karma speaks for itself, and I fully understand the weight and value of your opinion.
Re: (Score:2)
"The uniform shout of the Iranian nation is forever 'Death to Israel.'" --Iranian president Mahmoud Ahmadinejad
Re: (Score:2)
Just the ones that live in Israel. Great argument there.
Re: (Score:3, Informative)
Re: (Score:2)
"Would you like to live beside an expansionist who didn't think you were anything more than an animal?"
Iran isn't beside Israel.
Re: (Score:3, Insightful)
Re:Perhaps it's just me... (Score:5, Informative)
Go fuck yourself.
This is just pure lie, see proves below... (Score:5, Informative)
All this quotes are pure lies:
search for "must expel Arabs and take" in
http://en.wikiquote.org/wiki/David_Ben-Gurion [wikiquote.org]
search for "We must use terror, assassination, intimidation"
http://www.camera.org/index.asp?x_context=22&x_article=775 [camera.org]
etc...
some arab supported seem to just LOVE using lies as the best weapon.
Re: (Score:3, Informative)
A fair number of the GPs quotes seem to come from mepja.org [mepja.org], or at least are among those also quoted there.
I find both the original references, and the refutation links interesting.
The first refutation link is to a wiki (wikiquote), which one can imagine being subject to propaganda struggles on popular pages. The second refutation link describes the quote being refuted as from some entirely different sources than the GP's. One can't help but wonder, when a quote is attributed to different sources. Of cou
Cyber World War 2 and a Half... (Score:3, Interesting)
Or something like that. Could get a bit scary, push comes t5o shove and all that. I wonder who will get hit with the retaliatory strike?
Alternatively, I wonder if this is the retaliatory strike?
You are in a twisty maze of little passages, all alike...
Incentive to give this impression (Score:2, Insightful)
(repost as the first one isn't showing up)
They would in any case have an incentive to give the impression that everything grinds to a halt. The more their nuclear programme slows down the longer it will be until Israel feels the urgent need to bomb it.
I like to play a little game called "Which world do we live in?". You describe two worlds that are generally similar but differ on some characteristics, and try to find out which of the two worlds we live in, or ways to go about finding out. I am not sure of a
Spreading havoc? (Score:5, Insightful)
Re: (Score:3, Insightful)
As I understand it (I just used teh Google to figure out whether this worm phones home), the worm does phone "somewhere", and worms on a network update among themselves in a peer-to-peer fashion.
So, perhaps it started as one thing, and has become another. In particular, if the party answering the "phone home" can tell who is calling, they might deliver different payloads to known-Iranian IP addresses and other addresses. (That's what *I* would do.)
Reality seems to be catching up to our more paranoid fanta
Re:Spreading havoc? (Score:5, Insightful)
IAAICT (I am an Instrumentation and Controls Tech)
Stuxnet specifically targets Siemens Simatic Wincc software and associated PLC's. Essentially, the Wincc software is the programming base to interact with the PLC's, which are discreet CPU/memory clusters running optimized code for whatever it is you'd like to do. There are many PLC manufacturers and they use their own programming software to upload/download to their cpu's. The fact that this worm only interacts with Siemens software is not surprising as Siemens is one of the major manufacturers of industrial equipment. I have a large number of Siemens devices all around where I work. I do not use Siemens PLC's though, so I am unaffected by this worm.
This whole thing smells to me like a disgruntled software guy that used to work for Siemens.
Re: (Score:2)
I guess GP referred to the studies that concluded stuxnet would only activate some of its more dangerous parts only if the infected PLC had some very specific building blocks. So the "true" havoc would only be unlashed when the infected machine was part of a very specific facility (which was rumored, but never confirmed, to be "noclear plant", but that may be just some sensationalist's guess), while on all other infected hardware it would mostly stay ineffective, (apart from spreading and probably phoning h
Re: (Score:2)
The specific are that it looks for S7-300 and S7-400 controllers and modifies OB35, which is usually used for safety circuit type monitoring of very high speed processes. It also inserts blocks all over the PLC, which I assume is a method to increase scan times.
I've not seen anything to suggest that is looks for anything more specific than that and there are tons of S7-300/400s out there. It wouldn't likely cause 'havoc' in very many applications since OB35 isn't needed in very many generic industrial proce
Re:Spreading havoc? (Score:5, Interesting)
Re:Spreading havoc? (Score:5, Interesting)
The Air Force was recruiting hackers at DEFCON this year. The recruiter actually said they will take anyone, regardless of criminal record.
It seems reasonable that you wouldn't let criminal hackers work on your own defensive systems. So what *would* you do with them? You would develop offensive technology--that doesn't require the developers have any access to your own infrastructure.
Re: (Score:3, Insightful)
Why should they fear criminal hackers?
I'm sure during the "orientation" session it was made clear that if they fucked up, there were some scenarios to consider -- like suddenly finding yourself in Pelican Bay State Prison under a new name, starting a 30 year stretch for multiple child molestation convictions.
Re: (Score:3, Insightful)
Re:Spreading havoc? (Score:5, Informative)
Re: (Score:3, Informative)
How would the worm know if an input tied to turbine RPM or if it is some other device?
It wouldn't know that speficially, but it modifies a block that is used to control a process that requires a very fast response. There aren't very many applications that would require that block so most programmers wouldn't bother programming and tuning it and interrupting the normal logic scan unless they really needed it.
To me it seems that Stuxnet is trying to slow the response time of the block it modifies and of the PLC overall. If you were trying to control your oven's heating element by changing the
Re:Spreading havoc? (Score:5, Interesting)
It targets two specific models of Seimens programable logic controllers (by targeting the Windows software used to program those PLC's). PLC's are used to control very time-intensive industrial processes. Pretty much every power plant, nuke plant, modern manufacturing plant, etc. uses these, and they control very dangerous physical equipment. Reeking havoc with these processes can cause explosions, radiation leaks, major industrial accidents, etc. (it could even cause nuclear reactors to go critical). That's very bad stuff. Best case scenario, it could cause serious damage to equipment. Worse case scenario, it could cause significant lose of life.
In other words, tampering with a PLC can make things go BOOM. In 1982, the CIA purported did this [wikipedia.org] with the Siberian pipeline, and the resulting explosion was so powerful it set off missile launch alarms in the U.S.
Re: (Score:2)
No one knows exactly what it does. More than likely it did target a specific industrial complex with the purpose of physically damaging machinery. However, there could be multiple targets, or the software could be collecting data / signatures of additional hardware which it could be instructed to attack at a later time.
This is purported to be the most advanced, complex and highest quality malware ever discovered. I seriously doubt it would be spreading as far and wide as it has for so long if it was targeti
Re: (Score:2)
It's my understanding that Stuxnet was designed to only *do only* to one certain computer/system that was specifically targeted.
Right, and I believe that is the version released in January 2009. Now that the cat is out of the bag and Microsoft is likely to patch the 0-days, Stuxnet probably phoned home and was given all the remaining payloads. The results would be unknown at this point.
DEBKA is totally unreliable. (Score:5, Interesting)
This is DEBKA. Completely ridiculous website, riddled with disinfo.
Example:
Not only have their own attempts to defeat the invading worm failed, but they made matters worse: The malworm became more aggressive and returned to the attack on parts of the systems damaged in the initial attack.
'nuff said.
Of course, that does not mean Iran is not hit hard by Stuxnet - just that everything you read at this site should be taken with a big grain of salt.
Re: (Score:2)
Second.
MILLIONS of additional system? C'mon....
Worse it what could follow (Score:2)
I know that Mossad, the CIA, or whoever did this probably intended this to be a one-shot deal and didn't expect it to go as viral as it did. But I hope they truly appreciate what a nasty thing they've started. Now everyone will be doing it. And these sorts of viruses have the potential to cause real-world loss of life.
All this for a petty strike against a country that probably didn't even work (and would only have pushed them closer to war even if it had).
Is this really stupid, or... what? (Score:2, Insightful)
What I don't understand is why the *heck* the SCADA systems running Iran's { illegal | sooper-sekrit | stealth } nuclear weapons program aren't air-gapped! Isn't that something like standard procedure?
Re: (Score:2)
All it takes is one asshole to dig out the epoxy in the USB slots & not get caught & boom, you're infected.
Debka == BS (Score:2)
the accepted liability of running windows (Score:2, Interesting)
Go ahead and mod me down, but it's only a matter of time before this happens again. You either accept the liability and put your trust in microsoft for patches, or do something else. It's not a stretch to expect more of the same.
"At the same time, the company said it would not patch Windows because doing so would cripple existing applications."
http://www.computerworlduk.com/news/applications/3236953/microsoft-confirms-unpatched-vulnerabilities-in-key-enterprise-programs/ [computerworlduk.com]
"The security firms also notified Mi
get rid of windows (Score:2)
remedy is simple...
install some form of linux instead of windows, and run the scada software through wine
smells like more israeli racism than news to me (Score:3, Interesting)
have a look at the whois for debka
Registrant:
DEBKAfile Ltd.
4, Hamaapilim St.
Jerusalem, 92545
Israel
why should anyone trust news about Arabic interests that is published by people living in Israel ?
it would certainly suit Israeli interests to discredit the security of Iran and its the kind of racism that
seems to be all too common in Israel .
Toodle-pip
Amias
Re: (Score:3, Funny)
So what you're saying is you're treating the website differently because it's from a specific race.
Gotcha. Racist.
Thank God it's not named... (Score:3, Funny)
...Tuxnet.
or... ...Suxnet.
Re:DEBKAfile (Score:5, Interesting)
Re:Millions? (Score:5, Insightful)
Sadly, most industrial control stuff runs on Winderz. It's all DCOM-based and takes so much banging your head against the monitor to get configured and working properly that oftentimes, you end up having disabled most any security features available out of sheer "maybe THIS will work" frustration. When you finally DO get it working, the last thing you want to do is go back and start turning on the security features as it will just break this fragile house of cards.
At least that's been my experience with it.
Posting anonymously cuz I just kind of admitted I'm DOING IT WRONG. But I swear it's true.
Re: (Score:3, Informative)
I mean really, when Seimens or some other industrial supplier comes in, do they automatically say, "Oh, we need to have this connected to the internet for critical software updates." ? Do they use Microsoft's updating methods?
I can't speak for Siemens' method of updating that type of software but I know that for the MRI console software they make (for the Siemens MRIs) we have a VPN between the console and Siemens directly. No full internet access required.
Re: (Score:2)
Why does this site try to resize your browser Window? Is this Iran's attempt at getting back at us Westerners for Stuxnet or something?
Re: (Score:2)
You're not running NoScript? Shame on you.
Re: (Score:3, Insightful)
On the contrary! I was being nosy and noticed the script right at the top in the opening body tag, hence why I asked why it tries to resize your browser.
Re: (Score:2)
"this type of crap scares me because i'm not confident that the US infrastructure is hardened enough o protect against malicious cyber attacks."
Nor will it be unless it is attacked. End Lusers don't care about security until their system is broken. That cannot change due to human nature, so if we are to have some immunity we need coercive damage to force change.
Re: (Score:2)
Or just install AV on all the Windows machines...that you have running critical infrastructure and military command.