Stories by Robert McMillan

Stuxnet proves need for rapid response to security threats: US DHS chief

If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies, the head of the US Department of Homeland Security said on Monday.
"The key thing we learnt from Stuxnet was the need for rapid response across the private sector," DHS Secretary Janet Napolitano told engineering students at the University of California, Berkeley. "There, we need to increase the rapidity of response, because in that area -- as in several other recent attacks -- we've seen very, very sophisticated, very, very novel ways of attacking. When you're getting at control systems, now you're really talking [about] taking things over, so this is an area of deep concern for us."
Although nobody knows who created Stuxnet, many believe that it opened a new chapter in the annals of cybersecurity: the first worm written to destroy factory control systems. On Monday, Iran said it had been hit with a second worm, called Stars, but security experts aren't sure that it really falls into the same class as Stuxnet.
Stuxnet was a watershed event, according to Napolitano.
When Stuxnet hit, the US Deparment of Homeland security was sent scrambling to analyze the threat. Systems had to be flown in from Germany to the federal government's Idaho National Laboratory. In short order the worm was decoded, but for some time, many companies that owned Siemens equipment were left wondering what, if any measures, they should take to protect themselves from the new worm.
Both Siemens and the DHS group responsible for communicating with operators of industrial systems (the ICS-CERT, or Industrial Control Systems Cyber Emergency Response Team) could have been better at getting information out to the public, said Bob Radvanovsky, a security expert.
ICS-CERT has never posted information that wasn't already known to members of his discussion list, who share information amongst each other, he said.
Radvanovsky is the moderator of the Scadasec discussion list, an open forum for discussions about cyber security in industrial systems. "Both industry and government fail to understand the value of the Internet," he said.
With Stuxnet, neither Siemens nor DHS itself were the ones to explain that the worm was actually built to target -- and then destroy -- a particular industrial facility. That work was done by security researchers at Symantec, Kaspersky Lab, and -- most notably -- by security expert, Ralph Langner.

HP unveils new cloud platform

Hewlett-Packard CEO Leo Apotheker took a step out of Mark Hurd's shadow on Monday, unveiling a new cloud computing platform that puts the company in competition with Amazon and Google.

Google offers voice-tweeting service for Egyptians

SayNow may be better known for helping the Jonas Brothers and the NBA leave short voicemail messages for their fans, but on Monday it found another purpose: helping Egyptians communicate with the rest of the world.

iPad hackers' chats turned in by secret source

The government's case against two men charged with hacking into AT&T's website to steal email addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group.

Coming soon: A new way to hack into your smartphone

More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache for Apple, or for smartphone makers using Google's Android software.

[]