12 Jun 12. Technicians at computer security firm Kapersky Labs have linked a software code in the Flame virus to the Stuxnet cyber weapon, proving the teams responsible for the malware collaborated in the early stages of the development. Kapersky Labs chief security expert Alexander Gostev said: “The new findings that reveal how the teams shared source code of at least one module in the early stages of development prove that the groups co-operated at least once.
“What we have found is very strong evidence that Stuxnet/Duqu and Flame cyber-weapons are connected,” a company statement confirmed.
Symantec Corp, the world’s largest security firm, later echoed Kapersky’s sentiments, stating that some source code had been shared. The link is related to a module found in early versions of the Stuxnet malware named ‘Resource 207′, with the module bearing a strong resemblance to code used in Flame.
“The list includes the names of mutually exclusive objects, the algorithm used to decrypt strings, and the similar approaches to file naming,” Gostev added. The uncovered link is now highly likely to fuel increasing speculation that both Stuxnet and Flame are part of a US-led cyber campaign, forged with Israeli cooperation and designed to target Iran’s nuclear programme. Despite the target appearing to be Iranian nuclear facilities, computers across the globe have been infected, prompting cyber security reviews. A recent New York Times investigation alleged that the US was responsible for Stuxnet, created under orders from US President Barack Obama. Discovered in 2010, Stuxnet caused damage to centrifuges at a uranium enrichment facility in Natanz, Iran by causing them to accelerate. (Source: armytechnology.com)
11 Jun 12. Northrop Grumman Corporation has been awarded a cybersecurity contract to develop, integrate and sustain cloud-based information repositories in an integrated product development team environment with the government. The competitively awarded, multimillion-dollar contract from the Maryland Procurement Office is for one year with four additional option years.
12 Jun 12. General Dynamics C4 Systems’ new ProtecD@R PC encryptor secures data, imagery, video and other information stored on computer hard drives. Now certified by the National Security Agency (NSA) to protect information classified at the Secret level and below, the new
Suite B encryptor prevents unauthorized access to classified information if a computer is lost, stolen, or susceptible to insider threat. General Dynamics C4 Systems is a business unit of General Dynamics (GD). About the size of an external hard drive, the ProtecD@R PC encryptor connects to a computer using an industry standard interface. Once connected, the encryptor automatically secures the data as it moves between the computer’s processor and the hard drive, leaving the stored information encrypted and secure without reducing the computer’s processing speed. The ProtecD@R PC encryptor is designated by the NSA as a Cryptographic High Value Product (CHVP), Non-Controlled Cryptographic Item (CCI) enabling relaxed handling and accounting of the device making it ideal for use in environments where there is a high risk of equipment loss. General Dynamics’ ProtecD@R family of products include data-at-rest encryptors for laptop and desktop computers, as well network-level devices and rugged versions for use in tactical environments.
11 Jun 12. The University of Maryland and the Northrop Grumman Corporation will launch a landmark honors program designed to educate a new generation of advanced cybersecurity professionals. The unique program, Advanced Cybersecurity Experience for Students (ACES), will immerse undergraduate students in all aspects of the field to meet growing manpower needs in the nation and the State of Maryland.
ACES will engage a highly talented, diverse group of students—majors in computer science, engineering, business, public policy and the social sciences—in an int