News

Researchers from security firm Symantec have found and analyzed a version of the Stuxnet cybersabotage malware that predates previously discovered versions by at least two years and used a ...
Experts say the Stuxnet malware is groundbreaking technology that may have been created with the backing of a government.
A new cyber weapon using "nearly identical" parts of the cyber superweapon Stuxnet has been detected on computer systems in Europe and is believed to be a precursor to a potential Stuxnet-like ...
Stuxnet appeared to be crawling around the world, computer by computer, looking for some sort of industrial operation that was using a specific piece of equipment, a Siemens S7-300 programmable ...
The Stuxnet worm has hit the big time after Iranian officials confirmed that the malicious code was wreaking havoc at its first nuclear power station. Stuxnet chatter that started in July boiled ...
Vacon isn't the only company involved with Stuxnet that has a Chinese connection. The first genuine digital certificate used by Stuxnet developers was from RealTek Semiconductor Corp., a Taiwanese ...
New and important evidence found in the sophisticated “Stuxnet” malware targeting industrial control systems provides strong hints that the code was designed to sabotage nuclear plants, and ...
Clues that Stuxnet contained Flame code has been in researchers' logs since at least October 2010, when automated systems at Kaspersky received a malware sample and labeled it as Stuxnet.
While many security researchers believe Duqu was developed by the Stuxnet authors, there are others who believe a different team adapted the code for their purposes.
Stuxnet was intended to target nuclear plants as researchers discovered the malware only targets control systems in those facilities.
Stuxnet, a sophisticated virus that damaged Iran’s nuclear capability, is getting a lot of attention these days. And it should—it’s a fascinating story that combines international political intrigue ...