Compare cert salaries and plan your next career move
Bl8ckr0uter wrote: » No one is safe:Exclusive: Computer Virus Hits U.S. Drone Fleet | Danger Room | Wired.com
Hypntick wrote: » “We think it’s benign. But we just don’t know.” That scares the crap out of me.
slinuxuzer wrote: » Nice, I wonder how long it will be before a weapons system is rooted and use to actually launch an attack on the US or our allies?
RobertKaucher wrote: » I recall around 2 years ago we discussed the vulnerabilities of these systems. I am so not suprised it was not addressed. This is no different than the BEAST exploit. A vulnerability is recognized and no body does anything about it for years until they must...
powerfool wrote: » How many times have you been late to work because of one thing, versus being late because of several small impediments (hit snooze, shirt was too wrinkled, burnt breakfast, dog made a mess, had to stop and get gas, small traffic jam or ticket). That starts to sound like a crappy day real quick... and it is that sort of chain of events that leads to bad consequences. From what I have read... it looks like it was a key logger.
Everyone wrote: » A friend of mine asked me to weigh in on this the other day, as he knew I have a bit of insider knowledge in this area... As they say, I've "been there, done that, and got the t-shirt". I'm fairly certain this was the result of a stupid user not following the rules. I don't think this was anything targeted. That person will be found, and an example will be made of them. This is absolutely NOTHING like stuxnet. There's no danger of drones being remotely controlled via this virus.
MrAgent wrote: » One thing that that people fail to realize is that the drones are on a seperate network which is not connected to the internet in any shape or form. Now while the workstations they use to connect to the drones may be affected with a keylogger (probably by someone plugging in a usb device), it wont be transmitted anywhere, nor will remote control be possible by anyone outside of the agency providing the drone.
Everyone wrote: » Do you really think these issues aren't being acknowledge and addressed? I know from experience that they are, and "heads will roll". The moron who caused the infection will be punished, and so will the idiots who leaked the info to the media. Anyone who has access to the system at all is going to have to endure all sorts of retraining and briefings on how to prevent it from happening again.
Everyone wrote: » It will happen again, just like it happens on EVERY network. Why? Because USERS are stupid. Just when you think you've beaten all the stupid out of your users, you have a brand new batch of stupid coming in and using your network.
RobertKaucher wrote: » Why was this guy even allowed to do whatever he did to get the infection?
Everyone wrote: » What does being allowed have to do with it? Where does it say whoever was responsible was allowed to do it? People aren't allowed to do all sorts of things, but they still do them anyway.
Everyone wrote: » I can assure you the issue isn't just now being addressed because of this, it was an issue that has been addressed over and over and over and over again. People still do things no matter how many times they're told not to.
Everyone wrote: » I'll use a facility I work in without going into too much detail on it as an example. The entrance has several signs stating "No cell phone or electronic devices beyond this point." People are reminded via e-mails and routine briefings that they are NOT allowed to bring any electronic devices into the building. There is a spot in the man trap to empty your pockets and leave these things at before entering. There are cameras all over the place. Entry is controlled with 3 factors of identification. Do you think all this keeps people from bringing their cell phones into the building? Nope! We catch people doing it all the time. So far it's always been unintentional. Too bad for the guy who couldn't remember to take his phone out and leave it behind before entering. Now his phone gets destroyed, and he loses his job.
Everyone wrote: » These guys are bombarded with what they can and can't do on a regular basis. Someone always does it anyway, and you end up with these types of stories. If you read it, HBSS, which was a suite of McAfee products last time I had to touch it, picked it up. That is what is what was in place to catch the stupid mistakes that people make. It worked. So like I said, the issue of someone not following the rules will be READDRESSED. It's not like it's just coming up for the 1st time, it's just the first time YOU'VE heard of it. This wasn't "OMG they're doing it wrong and so incredibly vulnerable!" that people are making it out to be. It's more like "Oh crap it finally happened to us, good thing we caught it."
Everyone wrote: » There's one thing the Military does that I always wish I could still do in the Corporate sector, and that's shut down anything that doesn't comply with policies. I got to shut down entire networks due to people not taking care of identified vulnerabilities in a timely manner when I worked in the DoD. Oh you thought the message we sent you saying "Hey patch these systems" was just a suggestion? Well guess what, your network is now isolated. You have 0 access to anything outside your LAN until everything is brought to compliance. If you want services restored, you better prove you've fixed the problem. Have fun explaining to your superiors that they can't accomplish the mission because you didn't do your job. Oh how I've wished I could do that in the Corporate world.
Use of the drives is now severely restricted throughout the military. But the base at Creech was one of the exceptions, until the virus hit. Predator and Reaper crews use removable hard drives to load map updates and transport mission videos from one computer to another. The virus is believed to have spread through these removable drives. Drone units at other Air Force bases worldwide have now been ordered to stop their use.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.