Government-sponsored hackers are using a clever trick to attack critical infrastructure like nuclear power plants, dams and oil refineries. According to Eric Knapp, chief cybersecurity engineer at Honeywell, one third of malware found in critical infrastructure came from USB drives plugged in by users.
The story of Israel using a sophisticated cyberweapon to spy on the United States and others attending nuclear talks is getting weirder. According to Kaspersky, the attackers not only used a Stuxnet-like weapon — they also used a stolen security certificate from Foxconn to sign the malware.
Last year, we discovered that Iranian hackers had breached Navy computer systems, which sent an understandable wave of panic through the administration. But it looks like that might’ve just been the tip of a much bigger, more sophisticated and more deadly iceberg.