Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Norman To Run Webinar On Stuxnet Virus

Norman Security : 18 October, 2010  (Company News)
With SCADA security under increasing threat from the Stuxnet code, Norman is advising infrastructure companies to examine security carefully to prevent existing vulnerabilities from being exploited
Following reports that the cyber community has revealed that the Stuxnet virus code has been posted on the web, manufacturing, infrastructure and engineering industries are being urged to take even tighter preventative measures to protect themselves - now.

David Robinson, UK and Ireland country manager, Norman Data Defense said: 'It was just a matter of time before the Stuxnet code was published on the web for anyone, with even the most basic knowledge of coding, to alter and potentially wreak havoc on the industry. Now is the time to review IT security, no matter how small the risk. This is big news.'

The news has been flooded with the recent security breach of a major automation company reportedly caused by the Stuxnet virus being carried on a USB memory stick. 'This new type of virus has a boot file built-in and now that the code is in the hands of any malware writer it could mutate very quickly' added Robinson, who will host a webinar on the subject on 28th October at 2pm BST. Robinson has fifteen years experience working with companies such as Mistubishi, Rockwell and Intelluition working on SCADA and plant intelligence software.

But it's not just memory sticks that can spread this virus. 'These days anyone with a laptop or a device that connects remotely to a wireless network inside a company's firewall, is putting that company at risk. It will just be a matter of time before Stuxnet or its successors are evolved to wreak havoc on control systems and any other system that the user connects to if their laptop or portable device is infected.'

Norman Data Defense recently carried out research among ordinary workers and found that over half of people surveyed are more cautious with security issues when using their own PC/laptop that they are with their work one. And over three quarters of people would expect a pop up to appear on their screen to alert them to a breach of security which of course is not always going to happen.

Microsoft has issued patches to help users on Windows systems to protect themselves against Stuxnet, but, warns Robinson: 'My fear is that, with patch management protocols rarely in place in a control system environment, these warnings will go unheeded.'
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo