Also in this playlist...
This transcript is automatically generated
What experts say it's -- -- biggest and most advanced cyber weapon ever discovered it's called the flame virus were only first hearing about it now.
And it's main job.
It's -- -- and computer users -- grabbing images recording Internet activity.
And even secretly turning on the computer's microphone.
To record conversations a person is having.
At their -- how about that what you're seeing your screen there is were -- hats are already infected computer systems.
-- seven countries across the Middle East they include Iran Egypt Syria and Israel.
And analysts say it has all the markings.
Of a state sponsor -- computer weapon.
But what state.
Joining us for more on this Morgan right cyber terrorism analyst -- and I -- and sometimes these things have fingerprints.
Whose fingerprints are on this.
Well I don't have any intimate knowledge I'd love to say it's SARS because I'll say what this is one way to take down a regime.
That has ill intent there's nothing good that can come out of what Iran's doing so if it's us I say hey good job guys.
Well is being described as it being twenty times more code.
Then -- neck.
-- that was the virus that took down at you know reportedly took down some of the nuclear facilities in Iran.
It I don't know a lot about to -- times -- code.
To use -- -- who's an expert on cyber terrorism how how much more complicated.
Does that make this virus how much more effective.
It makes -- tremendously effective in fact you know some of the reports coming -- they're about you know we're hearing about special forces parachuting into North Korea to do reconnaissance.
Flame was designed to do exactly the same thing but NA -- on a network I mean we're mapping out.
Vulnerabilities were mapping out data systems were understanding where they store information how they get used to move information.
It's all designed to target their ability to make decisions.
Be able to an ink enabled nuclear -- in radium uranium enrichment.
It's and it's designed to take down their ability to produce these weapons and I'll say what it's obviously very effective it kind of the play which came first the chicken or the act in which came first the virus of the warm it sounds like in this instance.
This has been out there for while collecting information about stocks -- Could be delivered right on target just like a precision munition.
Let's just say it's not -- we'd like to take -- as you point out especially Pittsburgh for good not evil although let's say absolutely not us.
Our our systems hearing -- -- United States or are they susceptible to this type of virus.
Absolutely and -- has stated there's no such thing as perfect security and we'd be -- foolish to think that.
Were not vulnerable to the same type of attack -- -- we talk about.
State assistance things that controller critical infrastructure.
Things that are designed to take out utilities I mean I've been on before talking about those same thanks so.
It's very much a double edged sword as I said before dynamite was originally -- for peaceful purposes by Alfred Nobel it's been used for different things.
This is being used for good but coupled tweaks this could also be used -- -- very very bad thing.
Yes some context for -- I'm just curious Morgan what your computer looks like at home because whenever we do these stories you wonder.
Hey make sure that the microphone is and -- -- -- the camera doesn't go on -- my computer record everything I'm doing.
So is there anything that you suggest -- your family your friends and it comes to a computer safety in just protecting against viruses.
Yeah a simple things you know enable your own but make sure you have your own -- -- running -- strong passwords and strong encryption on your wireless network.
I mean I'm a Mac guy so I'm very familiar with how the math operates when the -- camera turns on and off.
But -- -- it take precautions I mean I don't do anything classified at home so nobody break in play just.
On the other hand if I do worry about banking passwords and sensitive information and working on -- -- -- also.
If you just take the basic level of precaution you can prevent eighty to 90% of all the problems that are out there it's a 10% -- the sophisticated criminals.
I don't think they're going to be targeting -- other folks but those -- -- -- going after financial institutions in the government and that's were more serious counter measures are being done.
Not gonna what I declassified.
Anything -- at any time.
But -- in -- now you never know however research might take you right Morgan.
-- had -- again as we learn more about his body back in and look forward it talking to again thank you you bet thanks again have a good day.
Filter by section