article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. widened to encompass virtually the whole world. In what is commonly referred to as the most destructive and costly cyber attack ever, the conspirators unleashed the 'NotPetya' malware. and a large U.S.

Malware 60
article thumbnail

CIOs Discover That Dumb Technology Can’t Always Be Upgraded

The Accidental Successful CIO

The person with the CIO job understands that software has underpinned the internet’s virtual world from inception, of course, and has shown both its potential and vulnerability. Cyber-physical systems are “embedded in virtually all aspects of our lives at this point in time. Dealing With The Old And The New.

System 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

GeekWire Awards 2020 revealed: Big winners, celebrities and surprises power virtual event

GeekWire

We couldn’t get together in person, but we still found a way to celebrate the best in Pacific Northwest tech on Thursday as the GeekWire Awards went virtual. PNNL’s VaporID project aims to advance detection of nuclear explosions and malware. Winners accepted via Zoom — only two forgot to un-mute!

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. And how might we defend ourselves? When they did that.

System 52
article thumbnail

Top 10 Most-Destructive Computer Viruses

Galido

Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem. As the stakes have grown, so too has the potential damage and destruction brought on by malware. Cyber Command. military strategy.

Malware 60