"Instead of fixing all their software problems, they're just trying to layer in security in the middle," said Sean Bodmer, chief researcher at CounterTack, in this article by Jeff Peters on HackSurfer: SCADA Security: No One Wants to Start a War, But They Could. Bodmer continues, "Some of these programs and some of these turbines are still running on Windows 98 believe it or not. I saw one a year and a half ago out in Washington state. The cost of these SCADA companies, energy companies, to actually turn off those turbines and do the software upgrade from Windows 98, in 2012 – the last year that I saw it – it costs them so much money they’d rather just wait until it crashes before actually stopping the turbine. It costs millions of dollars to stop and clean and get back going and the load balancing.”
Google has been reporting on phishing activity out of Iran since 2011. Jennifer LeClaire reports on CIO Today that the latest phishing campaigns are likely tied to the Iranian presidential election. According to Sean Bodmer, chief researcher of CounterTack, “There are always observable traits and effects in every campaign, incident or attack that infer the possible aggressor, and it would appear that political implications and motives may indeed be one of them in this particular case.”
Ericka Chickowski reports on Dark Reading: 12 Endpoint Security Myths Dispelled . There are plenty of misapprehensions and delusions about endpoint security receive little attention from security pundits. Sean Bodmer, chief researcher for CounterTack, weighs in on two of them – AV Is Outdated And Useless, and Some Endpoints Aren’t Important Enough To Be Attacked.
Chief Researcher for CounterTack, Sean Bodmer, provides commentary in Robert McGarvey’s story in Credit Union Times, Threat of the Week: DDoS For Hire on the Rise, on the growing business of DDoS for hire and the threat it poses to financial institutions.
Network World’s Products of The Week 5.20.13 reviews the launch of CounterTack Scout 4.0. Key Features: A cyber defense solution utilizing Deep System Inspection enables organizations to detect, assess and respond to advanced threat attacks. New Stealth Agent powers active defense solutions, including next-gen honeynets.