<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iran on Omid Farhang</title><link>https://omid.dev/tags/iran/</link><description>Recent content in Iran on Omid Farhang</description><generator>Hugo -- 0.152.2</generator><language>en-US</language><copyright>2025 Omid Farhang | All rights reserved.</copyright><lastBuildDate>Mon, 12 Dec 2022 23:37:43 +0330</lastBuildDate><atom:link href="https://omid.dev/tags/iran/index.xml" rel="self" type="application/rss+xml"/><item><title>Molybdenum deficiency is very rare, but not in Iran</title><link>https://omid.dev/2022/12/12/molybdenum-deficiency-is-very-rare-not-in-iran/</link><pubDate>Mon, 12 Dec 2022 23:37:43 +0330</pubDate><guid>https://omid.dev/2022/12/12/molybdenum-deficiency-is-very-rare-not-in-iran/</guid><description>&lt;p&gt;&lt;img loading="lazy" src="https://omid.dev/images/2022/12/molybdenum.jpg" alt="molybdenum" /&gt;
&lt;/p&gt;
&lt;h2 id="what-is-molybdenum"&gt;What is Molybdenum?&lt;/h2&gt;
&lt;p&gt;Molybdenum is a chemical element with the symbol Mo and atomic number 42 which is located in period 5 and group 6. The name is from Neo-Latin molybdaenum, which is based on Ancient Greek Μόλυβδος molybdos, meaning lead, since its ores were confused with lead ores.&lt;/p&gt;
&lt;h2 id="why-molybdenum-is-an-essential-nutrient"&gt;Why Molybdenum Is an Essential Nutrient&lt;/h2&gt;
&lt;p&gt;You may not have heard of the trace mineral molybdenum, but it is essential to your health.&lt;/p&gt;</description></item><item><title>Stuxnet Missing Link Found, Resolves Some Mysteries Around the Cyberweapon</title><link>https://omid.dev/2013/02/27/stuxnet-missing-link-found-resolves-some-mysteries-around-the-cyberweapon/</link><pubDate>Wed, 27 Feb 2013 16:12:00 +0000</pubDate><guid>https://omid.dev/2013/02/27/stuxnet-missing-link-found-resolves-some-mysteries-around-the-cyberweapon/</guid><description>&lt;p&gt;&lt;em&gt;Cross-posted from&lt;/em&gt; &lt;a href="http://www.wired.com/threatlevel/2013/02/new-stuxnet-variant-found/all/"&gt;&lt;em&gt;WIRED&lt;/em&gt;&lt;/a&gt;&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-Ddf4V0bOokQ/US4pBrXxyuI/AAAAAAAAH3Y/0ibgWKrHlgY/s1600-h/Ahmadinejad-at-Natanz-in-2008%25255B5%25255D.jpg"&gt;&lt;img loading="lazy" src="http://lh4.ggpht.com/-MjRcWkbyBz4/US4pE-oaobI/AAAAAAAAH3g/hyVPMApvy1Q/Ahmadinejad-at-Natanz-in-2008_thumb%25255B2%25255D.jpg?imgmax=800" alt="Ahmadinejad-at-Natanz-in-2008" title="Ahmadinejad-at-Natanz-in-2008" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As Iran met in Kazakhstan this week with members of the UN Security Council to discuss its nuclear program, researchers announced that a new variant of the sophisticated cyberweapon known as Stuxnet had been found, which predates other known versions of the malicious code that were reportedly unleashed by the U.S. and Israel several years ago in an attempt to sabotage Iran’s nuclear program.&lt;/p&gt;
&lt;p&gt;The new variant was designed for a different kind of attack against centrifuges used in Iran’s uranium enrichment program than later versions that were released, according to Symantec, the U.S-based computer security firm that &lt;a href="http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/"&gt;reverse-engineered Stuxnet in 2010&lt;/a&gt; and also found the latest variant.&lt;/p&gt;</description></item><item><title>Narilam Worm manipulates databases in Iran</title><link>https://omid.dev/2012/11/24/narilam-worm-manipulates-databases-in-iran/</link><pubDate>Sat, 24 Nov 2012 12:37:00 +0000</pubDate><guid>https://omid.dev/2012/11/24/narilam-worm-manipulates-databases-in-iran/</guid><description>&lt;p&gt;&lt;a href="http://lh3.ggpht.com/-PWZn6EPgNBA/ULC4ZTERsPI/AAAAAAAAHmw/7b0Vu2LvK1s/s1600-h/narilam-iran%25255B5%25255D.png" target="_blank"&gt;&lt;img title="narilam-iran" border="0" alt="narilam-iran" align="right" src="http://lh4.ggpht.com/-Yh9UYyqtVKA/ULC4bob5OCI/AAAAAAAAHm4/240JKydkDLU/narilam-iran_thumb%25255B3%25255D.png?imgmax=800" width="244" height="153" /&gt;&lt;/a&gt;h-Online: Security firm Symantec has discovered a specialised worm called W32.Narilam that can compromise SQL databases. Symantec &lt;a href="http://www.symantec.com/connect/blogs/w32narilam-business-database-sabotage"&gt;reports&lt;/a&gt; that the malware “speaks” Persian and Arabic and appears to target mainly companies in Iran. Narilam is, therefore, reminiscent of &lt;a href="http://www.h-online.com/news/item/Stuxnet-worm-can-control-industrial-systems-1080751.html"&gt;Stuxnet&lt;/a&gt; and its &lt;a href="http://www.h-online.com/news/item/Kaspersky-says-Stuxnet-and-Flame-are-related-after-all-1615750.html"&gt;variants&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Narilam spreads via &lt;a href="http://www.h-online.com/news/item/Stuxnet-worm-was-planted-by-inside-man-1525260.html"&gt;USB flash drives&lt;/a&gt; and network shares. Once inside the system, the worm searches for SQL databases that are accessible via the &lt;a href="http://en.wikipedia.org/wiki/OLE_DB"&gt;Object Linking and Embedding Database&lt;/a&gt; (OLEDB) API. Rather than steal found target data for intelligence purposes, the worm proceeds to modify or delete the data and can, says Symantec, cause considerable damage. Stuxnet similarly served no intelligence purpose and was designed to sabotage its target – an uranium enrichment facility in Natanz, Iran.&lt;/p&gt;</description></item><item><title>Panetta Sounds Alarm on Cyber-War Threat</title><link>https://omid.dev/2012/10/14/panetta-sounds-alarm-on-cyber-war-threat/</link><pubDate>Sun, 14 Oct 2012 17:19:00 +0000</pubDate><guid>https://omid.dev/2012/10/14/panetta-sounds-alarm-on-cyber-war-threat/</guid><description>&lt;p&gt;I just read this and I decided to share with you:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-rxSvJyUeLGM/UHrtIE_jhnI/AAAAAAAAHhM/98q2e7uYTGg/s1600-h/panetta%25255B2%25255D.jpg" target="_blank"&gt;&lt;img title="panetta" border="0" alt="panetta" src="http://lh5.ggpht.com/-p8vF4Ptr3LI/UHrtK7zfeYI/AAAAAAAAHhU/NM6DEXxF0uE/panetta_thumb%25255B2%25255D.jpg?imgmax=800" width="504" height="337" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the hour-long session with the magazine’s editors, he said:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;– “We are facing the threat of a new arena in warfare that could be every bit as destructive as 9/11 — the American people need to know that. We can’t hide this from the American people any more than we should have hidden the terrorism-attack threat from the American people.”&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Grand Ayatollah Ali Khamenei Joins Instagram, Posts Pics</title><link>https://omid.dev/2012/08/02/grand-ayatollah-ali-khamenei-joins-instagram-posts-pics/</link><pubDate>Thu, 02 Aug 2012 13:08:00 +0000</pubDate><guid>https://omid.dev/2012/08/02/grand-ayatollah-ali-khamenei-joins-instagram-posts-pics/</guid><description>&lt;p&gt;&lt;a href="http://lh5.ggpht.com/-dtiAoEukghg/UBp0sry4YII/AAAAAAAAGq8/5bRr5cT3vFg/s1600-h/Ayatollah%25255B4%25255D.jpg" target="_blank"&gt;&lt;img title="Ayatollah" border="0" alt="Ayatollah" src="http://lh3.ggpht.com/-uibzAXOLE2o/UBp0u_H10lI/AAAAAAAAGrE/zFBHHnm8gyc/Ayatollah_thumb%25255B2%25255D.jpg?imgmax=800" width="504" height="429" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Mashable: Iran’s Grand Ayatollah Ali Khamenei joined Instagram last week and so far has posted four photos. Iran’s supreme leader since 1989 chose to share shots that likely show scenes of Ramadan.&lt;/p&gt;
&lt;p&gt;It comes as &lt;a href="http://www.theatlantic.com/international/archive/2012/08/irans-supreme-leader-joined-instagram-heres-his-first-photo/260607/"&gt;a surprise to some&lt;/a&gt; that a person who has been slow to get onboard with social media trends — not to mention Iran’s stance toward its citizens’ use of the social media — has joined Instagram. His &lt;a href="https://twitter.com/khamenei_ir"&gt;Twitter account&lt;/a&gt; has 4,337 followers so far, and links to &lt;a href="http://instagram.com/p/NbE2mVrVWJ/"&gt;his Instagram account&lt;/a&gt;. Also posted on his Twitter account are links to YouTube videos and stories about his visits with other world and religious leaders.&lt;/p&gt;</description></item><item><title>Madi Malware: Another Trojan Targets Organizations from the Middle East [Updated]</title><link>https://omid.dev/2012/07/18/madi-malware-another-trojan-targets-organizations-from-the-middle-east-updated/</link><pubDate>Wed, 18 Jul 2012 10:06:00 +0000</pubDate><guid>https://omid.dev/2012/07/18/madi-malware-another-trojan-targets-organizations-from-the-middle-east-updated/</guid><description>&lt;p&gt;This article is copied from &lt;a href="http://news.softpedia.com/news/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-281808.shtml?utm_medium=twitter&amp;#038;utm_source=twitterfeed" target="_blank"&gt;Softpedia&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Researchers from&lt;/strong&gt; &lt;a href="http://www.symantec.com/connect/blogs/madi-attacks-series-social-engineering-campaigns"&gt;Symantec&lt;/a&gt;&lt;strong&gt;,&lt;/strong&gt; &lt;a href="https://www.securelist.com/en/blog/208193677/The_Madi_Campaign_Part_I"&gt;Kaspersky&lt;/a&gt; &lt;strong&gt;and&lt;/strong&gt; &lt;a href="http://blog.seculert.com/2012/07/mahdi-cyberwar-savior.html"&gt;Seculert&lt;/a&gt; **have all come across Madi (Madhi), a relatively new piece of malware that mainly targets organizations from the Middle East.&lt;br&gt;
**&lt;br&gt;
&lt;a href="http://lh4.ggpht.com/-4MNSYkERUms/UAaDk4ySqZI/AAAAAAAAGe8/ef_WdaAE8Ng/s1600-h/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2%25255B4%25255D.png" target="_blank"&gt;&lt;img title="Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2" border="0" alt="Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2" align="right" src="http://lh4.ggpht.com/-CBbuAJoWo-Q/UAaDpOmJ6YI/AAAAAAAAGfE/iKLgaN1G70Y/Madi-Malware-Another-Trojan-Targets-Organizations-from-the-Middle-East-2_thumb%25255B2%25255D.png?imgmax=800" width="244" height="189" /&gt;&lt;/a&gt;Before we take a look at Madi and compare it to other infamous Trojans such as Stuxnet, Duqu, or Flame, let’s take a quick look at its name.&lt;/p&gt;
&lt;p&gt;According to Wikipedia, &lt;a href="http://en.wikipedia.org/wiki/Mahdi"&gt;Mahdi&lt;/a&gt; is considered to be the redeemer of Islam who will rid the world of tyranny, injustice and wrongdoings.&lt;/p&gt;</description></item><item><title>AVAST software blocked its services for embargoed countries</title><link>https://omid.dev/2012/05/29/avast-software-blocked-its-services-for-embargoed-countries/</link><pubDate>Tue, 29 May 2012 15:41:00 +0000</pubDate><guid>https://omid.dev/2012/05/29/avast-software-blocked-its-services-for-embargoed-countries/</guid><description>&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-E-Av7oSSnT0/T8Tm_bSMxOI/AAAAAAAAGI8/vW_iLJehqSo/s1600-h/avast%25255B6%25255D.png"&gt;&lt;img title="avast" border="0" alt="avast" align="right" src="http://lh6.ggpht.com/-oYFr8vNLzaY/T8TnFIhxHfI/AAAAAAAAGJE/YGwCUxrhoSQ/avast_thumb%25255B4%25255D.png?imgmax=800" width="149" height="55" /&gt;&lt;/a&gt;Petr Chocholous in response to Iranian users contacting avast saying they are unable to open website or update their antivirus said:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;AVAST Software a.s. is currently blocking access to port 80 (that effectively means websites and updates of avast! software) of its servers from following countries: Iran, Sudan, Cuba, Syria, North Korea and Burma/Myanmar. AVAST Software a.s. [and its subsidiaries/sister companies] must not provide any services in these countries because of policies and regulations that are applicable to AVAST Software a.s.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Flame worm – Iran claims to discover new Stuxnet-like malware</title><link>https://omid.dev/2012/05/28/flame-worm-iran-claims-to-discover-new-stuxnet-like-malware/</link><pubDate>Mon, 28 May 2012 14:57:00 +0000</pubDate><guid>https://omid.dev/2012/05/28/flame-worm-iran-claims-to-discover-new-stuxnet-like-malware/</guid><description>&lt;p&gt;Naked Security wrote:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-QohaM1XK7OA/T8OLUDmIspI/AAAAAAAAGHc/ZGu8EXRoFUQ/s1600-h/iran-flames-170%25255B2%25255D.jpg"&gt;&lt;img title="iran-flames-170" border="0" alt="iran-flames-170" align="right" src="http://lh3.ggpht.com/-H7i2lfAgAmg/T8OLWPeXIYI/AAAAAAAAGHk/Js_udYnFn9k/iran-flames-170_thumb.jpg?imgmax=800" width="170" height="128" /&gt;&lt;/a&gt;&lt;em&gt;The Iranian Computer Emergency Response Team (MAHER) claims to have discovered a new targeted malware attack attacking the country, which has been dubbed Flame (also known as Flamer or Skywiper).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;In a&lt;/em&gt; &lt;a href="http://www.certcc.ir/index.php?name=news&amp;amp;file=article&amp;amp;sid=1894"&gt;&lt;em&gt;statement&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, researchers say that they believe the malware is “a close relation” to Stuxnet, and claim that Flame is not detected by any of 43 anti-virus products it tested against, but that detection was issued to select Iranian organizations and companies at the beginning of May.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Fake Google Iranian domain defaced by Algerian Script Kiddies</title><link>https://omid.dev/2012/05/03/fake-google-iranian-domain-defaced-by-algerian-script-kiddies/</link><pubDate>Thu, 03 May 2012 20:31:00 +0000</pubDate><guid>https://omid.dev/2012/05/03/fake-google-iranian-domain-defaced-by-algerian-script-kiddies/</guid><description>&lt;p&gt;&lt;a href="http://thehackernews.com/2012/05/google-iraq-defaced-by-anonymous.html"&gt;TheHackerNews&lt;/a&gt;: Google got Pwned ? NO Few &lt;strong&gt;Algerian Script Kiddies&lt;/strong&gt; try to spread fake rumors that they Hack and Deface the Giant Search engine “&lt;strong&gt;Google Iranian&lt;/strong&gt;” domain &lt;a href="http://www.google.co.ir/"&gt;http://www.google.co.ir/&lt;/a&gt; . As the screenshot shown a Algerian flag on it and Page Titles : **“**&lt;strong&gt;H4Ck3D By vaga-hacker dz and DR.KIM”.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://omid.dev/images/2012/05/Google-IRAN-hacked_thumb1.jpg"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2012/05/Google-IRAN-hacked_thumb1.jpg" alt="Google IRAN hacked_thumb[1]" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As mentioned by hacker, the team include hackers named : “&lt;strong&gt;V4Ga-Dz,Dz0ne,DR-KIM King-Dz,BroX0 aghilass elite jrojan password kha&amp;amp;mix wasim -dz&lt;/strong&gt;” . It is not confirmed that, either these are member from some Anonymous Hackers but they try to use Anonymous Hackers Tag line : We Dont Forget , We Dont Forgive, &lt;strong&gt;Expect Us!&lt;/strong&gt; to get some publicity.&lt;/p&gt;</description></item><item><title>Iran makes its own anti-virus software – would you buy it?</title><link>https://omid.dev/2012/05/03/iran-makes-its-own-anti-virus-software-would-you-buy-it/</link><pubDate>Thu, 03 May 2012 14:18:00 +0000</pubDate><guid>https://omid.dev/2012/05/03/iran-makes-its-own-anti-virus-software-would-you-buy-it/</guid><description>&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-2K9ieOBJfOA/T6KMgu5z8KI/AAAAAAAAF2g/UECmXPSazoA/s1600-h/binary-iran-170%25255B2%25255D.jpg"&gt;&lt;img title="binary-iran-170" border="0" alt="binary-iran-170" align="right" src="http://lh3.ggpht.com/-7L9s3XfQD9E/T6KMjC3EhSI/AAAAAAAAF2o/h1w9qgvmPW4/binary-iran-170_thumb.jpg?imgmax=800" width="170" height="170" /&gt;&lt;/a&gt;&lt;a href="http://nakedsecurity.sophos.com/2012/05/03/iran-builds-anti-virus-software/" target="_blank"&gt;SophosLabs&lt;/a&gt;: According to &lt;a href="http://en.trend.az/regions/iran/2021650.html"&gt;reports&lt;/a&gt;, Iran has started making its own anti-virus software.&lt;/p&gt;
&lt;p&gt;It is said that experts from Shiraz Computer Emergency Response Team of APA (Academic Protection and Awareness) of Iran have been working on the project to help better protect the country&amp;rsquo;s digital defenses.&lt;/p&gt;
&lt;p&gt;Of course, Iran is no stranger to malware. It found itself thrust into the spotlight in 2010 when the infamous Stuxnet worm was widely reported to have infected industrial plants (including nuclear plants) in the country with the seeming intention to target and sabotage SCADA systems.&lt;/p&gt;</description></item><item><title>Iran oil terminal suffers malware attack</title><link>https://omid.dev/2012/04/24/iran-oil-terminal-suffers-malware-attack/</link><pubDate>Tue, 24 Apr 2012 16:39:00 +0000</pubDate><guid>https://omid.dev/2012/04/24/iran-oil-terminal-suffers-malware-attack/</guid><description>&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-SfZ9Gr7GW2Y/T5bQLijZqvI/AAAAAAAAFoY/-Mf4Nu4SdW8/s1600-h/oilrefinery%25255B3%25255D.png"&gt;&lt;img title="oilrefinery" border="0" alt="oilrefinery" align="right" src="http://lh3.ggpht.com/-9XzmUGOrkpg/T5bQOnZ6X1I/AAAAAAAAFog/JSap3YriweI/oilrefinery_thumb%25255B1%25255D.png?imgmax=800" width="240" height="240" /&gt;&lt;/a&gt;The BBC is &lt;a href="http://www.bbc.co.uk/news/technology-17811565"&gt;reporting&lt;/a&gt; that websites belonging to the Iranian oil ministry and national oil company are offline after suffering a malware infection this weekend.&lt;/p&gt;
&lt;p&gt;Iran has disconnected all of its oil processing facilities as a precaution, including the facility at Kharg Island which processes more than 90% of Iran&amp;rsquo;s exports.&lt;/p&gt;
&lt;p&gt;The semi-official news agency, Mehr, reported that information about users of the websites had been stolen, but no sensitive data had been accessed.&lt;/p&gt;</description></item><item><title>Banking System Vulnerability – 3 million bank accounts hacked in Iran [Updated]</title><link>https://omid.dev/2012/04/17/banking-system-vulnerability-3-million-bank-accounts-hacked-in-iran-updated/</link><pubDate>Tue, 17 Apr 2012 11:38:00 +0000</pubDate><guid>https://omid.dev/2012/04/17/banking-system-vulnerability-3-million-bank-accounts-hacked-in-iran-updated/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/2012/04/hacker-divulges-data-on-10-iranian.html" target="_blank"&gt;As I said in the other post, Iran&amp;rsquo;s Central Bank has announced that the electronic information of 3 million customers of 10 Iranian banks have been compromised.&lt;/a&gt; These banks now require their customers to change their ATM pin numbers before they can access their account. This has caused a rush to the ATM machines by the worried customers.&lt;/p&gt;
&lt;p&gt;The hacker was identified as Khosro Zare&amp;rsquo;, a former bank-system specialist in Iran who recently left the country. Zare&amp;rsquo; claimed in a blog that he hacked the PIN codes to highlight the vulnerability of Iran&amp;rsquo;s banking system.&lt;/p&gt;</description></item><item><title>Hacker divulges data on 10 Iranian banks, central bank warns clients [Updated]</title><link>https://omid.dev/2012/04/15/hacker-divulges-data-on-10-iranian-banks-central-bank-warns-clients-updated/</link><pubDate>Sun, 15 Apr 2012 17:21:00 +0000</pubDate><guid>https://omid.dev/2012/04/15/hacker-divulges-data-on-10-iranian-banks-central-bank-warns-clients-updated/</guid><description>&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-mzKHTEr5WLY/T4r8gZu4CwI/AAAAAAAAFgs/QVPgxb3AmmQ/s1600-h/Debit-Cards%25255B2%25255D.jpg"&gt;&lt;img loading="lazy" src="http://lh5.ggpht.com/-GTbYusJv5-U/T4r8jpEAexI/AAAAAAAAFg0/kES1PdOjj2U/Debit-Cards_thumb.jpg?imgmax=800" alt="Debit-Cards" title="Debit-Cards" /&gt;
&lt;/a&gt;An Iranian hacker published the information about some 3 million debit cards of 10 Iranian banks, including codes and passwords.&lt;/p&gt;
&lt;p&gt;The information has been published by someone named “Khosrow Zare Farid” who was the manager of a company which operates SHETAB payment network in Iran and produces and installs POS devices.&lt;/p&gt;
&lt;p&gt;“Around one year ago I found a critical bug in the system. Then I wrote and sent a formal report to all the CEO of banks in Iran but none of them replied to me. Now I decided to publish the information. Governments tried to catch me by Iran Cyber Army but they failed,” he said, according to Kabir News website&lt;/p&gt;</description></item><item><title>Iran increasingly controls its Internet [Update 6]</title><link>https://omid.dev/2012/02/09/iran-increasingly-controls-its-internet-update-6/</link><pubDate>Thu, 09 Feb 2012 22:20:00 +0000</pubDate><guid>https://omid.dev/2012/02/09/iran-increasingly-controls-its-internet-update-6/</guid><description>&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-A1LnU8Y6uGU/TzQ_VciwJQI/AAAAAAAAEms/LwxiygHb6zo/s1600-h/iran-internet-censors%25255B2%25255D.jpg"&gt;&lt;img title="iran-internet-censors" border="0" alt="iran-internet-censors" align="right" src="http://lh4.ggpht.com/-9bbLyP_eQN4/TzQ_fGpbUWI/AAAAAAAAEm0/1yqoTUCqqZ4/iran-internet-censors_thumb.jpg?imgmax=800" width="244" height="164" /&gt;&lt;/a&gt;&lt;strong&gt;Washington Post wrote:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;TEHRAN — Whenever an Iranian blogger, connects to the Internet from his office, they switches on a special connection that for years would bypass the Islamic republic’s increasingly effective firewall.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;But recently the software, which allowed them to go online through portals elsewhere in the world, stopped working. When it sporadically returns, speeds are so excruciatingly slow that sites such as Facebook become unusable.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;[SNIP]&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Many fear that the disabling of the software used to bypass the state-run firewall heralds the coming of what authorities have labeled the National Internet. The government’s technology officials have announced the construction of a domestic Internet network comparable to an office intranet, which would block many popular sites. They have hinted the National Internet can be launched at any time, and have said it will gradually start working over the coming three years.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Iranian block on Tor traffic quickly foiled</title><link>https://omid.dev/2011/09/16/iranian-block-on-tor-traffic-quickly-foiled/</link><pubDate>Fri, 16 Sep 2011 13:58:00 +0000</pubDate><guid>https://omid.dev/2011/09/16/iranian-block-on-tor-traffic-quickly-foiled/</guid><description>&lt;p&gt;&lt;a href="http://4.bp.blogspot.com/-jZU7fXtdOi0/TnNOpyrNktI/AAAAAAAAECI/2HuwYeqtLLg/s1600/Tor_Logo200.png"&gt;&lt;img loading="lazy" src="http://4.bp.blogspot.com/-jZU7fXtdOi0/TnNOpyrNktI/AAAAAAAAECI/2HuwYeqtLLg/s1600/Tor_Logo200.png" alt="" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The H-Security:&lt;/strong&gt; The online privacy and security service &lt;a href="https://www.torproject.org/index.html.en"&gt;Tor&lt;/a&gt; was blocked by the Iranian government late evening (local time) 13 September. This was done by adding a filter rule to the Iranian border routers which identified Tor traffic and blocked it. The blocking was quickly discovered by Tor and the project released a fix a few hours later. The fix consists of a new version of the Tor software, &lt;a href="http://archives.seul.org/tor/talk/Sep-2011/msg00187.html"&gt;Tor 0.2.3.4-alpha&lt;/a&gt;, and once this is installed on relays and bridges, the company expects normal service to be resumed for users in Iran.&lt;/p&gt;</description></item><item><title>An update on attempted man-in-the-middle attacks</title><link>https://omid.dev/2011/08/31/an-update-on-attempted-man-in-the-middle-attacks/</link><pubDate>Wed, 31 Aug 2011 22:19:00 +0000</pubDate><guid>https://omid.dev/2011/08/31/an-update-on-attempted-man-in-the-middle-attacks/</guid><description>&lt;p&gt;&lt;a href="http://4.bp.blogspot.com/-pRWbbTDU_xs/Tl6sGz7y_hI/AAAAAAAAEAc/QqyT7jOv5mo/s1600/Google.jpg"&gt;&lt;img loading="lazy" src="http://4.bp.blogspot.com/-pRWbbTDU_xs/Tl6sGz7y_hI/AAAAAAAAEAc/QqyT7jOv5mo/s320/Google.jpg" alt="" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Google:&lt;/strong&gt; Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it).&lt;br&gt;
Google Chrome users were protected from this attack because Chrome was able to &lt;a href="http://blog.chromium.org/2011/06/new-chromium-security-features-june.html"&gt;detect&lt;/a&gt; the fraudulent certificate.&lt;/p&gt;</description></item><item><title>Iran: Computer Malware Sabotaged Uranium Centrifuges</title><link>https://omid.dev/2010/11/30/iran-computer-malware-sabotaged-uranium-centrifuges/</link><pubDate>Tue, 30 Nov 2010 22:55:00 +0000</pubDate><guid>https://omid.dev/2010/11/30/iran-computer-malware-sabotaged-uranium-centrifuges/</guid><description>&lt;p&gt;&lt;a href="http://lh4.ggpht.com/_vaUVXcmC3OI/TPV5dolswqI/AAAAAAAADTM/kJf3tn1Xm3M/s1600-h/Natanz-nuclear-facility%5B3%5D.jpg"&gt;&lt;img loading="lazy" src="http://lh6.ggpht.com/_vaUVXcmC3OI/TPV5wJuIuoI/AAAAAAAADTQ/zqYxntRWWpA/Natanz-nuclear-facility_thumb.jpg?imgmax=800" alt="Natanz-nuclear-facility" title="Natanz-nuclear-facility" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A security man stands next to an anti-aircraft gun as he scans Iran’s nuclear enrichment facility in Natanz, 300 kilometers [186 miles] south of Tehran, Iran, in April 2007.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wired:&lt;/strong&gt; In what appears to be the first confirmation that the Stuxnet malware hit Iran’s Natanz nuclear facility, Iranian President Mahmoud Ahmadinejad said Monday that malicious computer code launched by “enemies” of the state had sabotaged centrifuges used in Iran’s nuclear-enrichment program.&lt;/p&gt;</description></item><item><title>Stuxnet in the news</title><link>https://omid.dev/2010/09/30/stuxnet-in-the-news/</link><pubDate>Thu, 30 Sep 2010 22:34:00 +0000</pubDate><guid>https://omid.dev/2010/09/30/stuxnet-in-the-news/</guid><description>&lt;p&gt;The Stuxnet Trojan is very well covered in the media as more and more details about its sophisticated code become public. It abuses four previously unknown security vulnerabilities in Windows to enter the system and is specialized on attacking Siemens processing systems. An interesting information which didn’t get much attention yet comes from &lt;a href="http://www.h-online.com/security/news/item/Stuxnet-brings-more-new-tricks-to-cyberwar-1098810.html"&gt;heise Security&lt;/a&gt;: The nuclear plant in Busheer isn’t really the target of the worm as rumours say, as the attacked systems aren’t approved for usage in nuclear plants.&lt;/p&gt;</description></item></channel></rss>