Right now we have a financial system with the same vulnerabilities that it had before this crisis began.
However, that was not the case in the episode involving the FDA chemist, underscoring the vulnerabilities in the system.
FORBES: Why Pharma Stocks May Rise Before Trial Data Is Released
When a large Southern California water system wanted to probe the vulnerabilities of its computer networks, it hired Los Angeles-based hacker Marc Maiffret to test them.
Android is known to have a lot of vulnerabilities to its operating system.
After the 2003 blackout revealed the vulnerabilities of the transmission system and the immediate need for new power lines Congress in 2005 gave the federal government "backstopping" authority to site new projects.
Microsoft warned customers this week that two critical vulnerabilities in its Windows operating system are being actively exploited by computer crooks to take over users' computers.
This move to exploit social network sites would also fuel a move away from attacks that exploit vulnerabilities in the Windows operating system to gain control of a PC or steal data.
Widely distributed Android malware has exploited known security vulnerabilities in the Android operating system for which fixes from Google existed, but which the vast majority of consumer devices had not received at the time of infection.
FORBES: ACLU Files FTC Case Against Wireless Carriers Over Not Updating Android Phones
Instead, they are describing a way for an attacker to more easily exploit security vulnerabilities that must already be present on the system.
There are also worrying vulnerabilities in the architecture of Britain's financial system.
In another case, the Massachusetts Bay Transportation Authority was granted an injunction two years ago to prevent a group of college students from detailing vulnerabilities in the transportation authority's automated fare system.
In a presentation at the Black Hat and Defcon security conference in July, for instance, French security researcher Andre Costin presented vulnerabilities in the next-generation air traffic control system known as ADS-B that he said would allow a hacker with a software-defined radio to track and even spoof planes in the sky, potentially creating dangerous distractions for pilots.
FORBES: DARPA-Funded Radio HackRF Aims To Be A $300 Wireless Swiss Army Knife For Hackers
On Wednesday, Apple released an update to its iOS operating system for iPhones, iPads, and iPod Touches that closes two vulnerabilities used by JailbreakMe, a site that surfaced less than two weeks ago with a clever method of breaking the safeguards on iPhones to allow unauthorized apps to be installed.
FORBES: Apple Patches JailbreakMe: Will iPhone Jailbirds Sacrifice Liberty For Security?
Often, Wright would patch the most obvious vulnerabilities but leave esoteric ones unpatched, allowing hackers to exploit the system as he monitored their behavioral patterns.
In short, like every other major new weapons system introduced since the slingshot, Stuxnet creates new strengths as well as new vulnerabilities for the states that may wield it.
Demanding fewer bugs in government-bought software could reduce the vulnerabilities that have allowed hackers to breach agencies and companies without requiring any new monitoring or information sharing system that might affect privacy.
FORBES: President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy
应用推荐