Stuxnet-like malware that is targeting industrial control systems has been uncovered by security researchers at FireEye.
Ali Taherian reports.
Once again, Microsoft finds itself patching Windows against attacks that can strike at your PC through the USB drive.
Read more in my article on the Optimal Security blog.
A defector tells the BBC that North Korea has apocalyptic cyberwarfare capabilities.
North Korea’s nuclear programme was allegedly targeted by an American-sponsored malware attack.
But, unlike Stuxnet in Iran, it failed.
For over four years, nobody noticed that a Microsoft patch designed to stop exploitation of a vulnerability used by the notorious Stuxnet worm could be easily circumvented.
Now Microsoft has released a new patch, and not a moment too soon.
Eugene Kaspersky has claimed that the Stuxnet virus – widely believed to have been built by the United States and Israel to disrupt Iran’s nuclear plans – managed to also infect the internal network of a Russian nuclear plant.
Computer security veteran Philip Le Riche shares his thoughts on the possibility of cyberwarfare.
The Stuxnet virus was created by the USA to target an Iranian nuclear facility, but accidentally escaped into the wider world, claims the New York Times.
Is Flame a big malware threat?
Well, yes it is. But perhaps not in the way you think.
Iranian authorities claim to have discovered another targeted cyberattack against the country – the Flamer worm (also known as Flame).
Iran is reported to have started making its own anti-virus software.
Would you buy it?
US Deputy Defense Secretary William Lynn is put on the spot.
Did the US write the Stuxnet worm or not?
Iranian officials today claimed to have intercepted a cyberwarfare attack, involving malware designed to spy upon government systems.
Does anyone really know the truth behind the number “19790509”, embedded inside the Stuxnet worm?
And what – if anything – does The Grateful Dead have to do with it?