This Zero Day Exploitation affects all Windows including Win 7. :-(
James P. Cottingham
[sup]I'm number 1,229!
I'm number 1,229![/sup]
James P. Cottingham
[sup]I'm number 1,229!
I'm number 1,229![/sup]
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
The primary use of that verse would be to be taken spiritually, I believe, however taking it literally in a physical sense right now would not be a bad idea.Prov 5:15 (KJV)
15 Drink waters out of thine own cistern, and running waters out of thine own well.
Not easily. I think the point of targeting the Siemens system is that it has a known admin password that can't be changed. With other SCADA systems, the underlying Windows can be compromised, but the the hacker still needs to figure out how to hack the SCADA itself after getting access to the underlying OS. In addition, most SCADA systems are isolated to private VLANS or even physically separate LANS to help protect them.sggaunt said:What I am saying is that vunerability is not going to be bringing down all of the worlds industrial automation systems.
Baahhh, who uses the desktop, taskbar and Start menu anyway? Command Prompt all the way, baby.the tool ... is only a makeshift defense, one that many users may resist applying, since it makes much of the Windows system, including the desktop, taskbar and Start menu, almost unusable
Baahhh, who uses the desktop, taskbar and Start menu anyway? Command Prompt all the way, baby.
SCADA systems are isolated to private VLANS or even physically separate LANS to help protect them.
Thanks, those links will provide some interesting reading.MasterRacker said:If you like the "we're all gonna DIE!" stories, here's a couple:
In the revised security advisory published yesterday Microsoft acknowledged the new attack vector.
"An attacker could also set up a malicious Web site or a remote network share and place the malicious components on this remote location," the company said in the advisory. "When the user browses the Web site using a Web browser such as Internet Explorer or a file manager such as Windows Explorer, Windows will attempt to load the icon of the shortcut file, and the malicious binary will be invoked."
That language was a change from earlier statements by Microsoft, which had said that attackers could hijack Windows PC by setting up a remote network share, a much more complicated task than building a malware-spreading Web site. In the earlier advisory, Microsoft also said that "the malicious binary may be invoked; the most recent warning instead said "the malicious binary will be invoked [emphasis added in both cases].