Read more about Stuxnet
Bookmark and Share
  • First victims of the Stuxnet worm revealed

    11.11.2014

    After analyzing more than 2,000 Stuxnet files collected over a two-year period, Kaspersky Lab can identify the first victims of the Stuxnet worm.

  • Researcher offers new perspective on Stuxnet-wielding sabotage program

    21.11.2013

    Stuxnet, the malware that rocked the security world and the first recorded cyber weapon, has an older and more complex “sibling” that was also aimed at disrupting the functioning of Iran's uranium enrichment facility at Natanz, but whose modus operandi was different.

  • The TAO of NSA

    02.09.2013

    In last week's reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for hunting down Osama bin Laden.

  • Stuxnet attack was illegal under international law, experts say

    26.03.2013

    The Tallinn Manual on the International Law Applicable to Cyber Warfare - the recently released tentative rulebook on what actions should and should not be considered or allowed during cyber conflicts involving states - has raised a lot of interest in security circles.

  • Stuxnet's earliest known version sheds light on the worm's development

    26.02.2013

    Symantec researchers have discovered an older version of the infamous Stuxnet worm that caused the disruption at Iran's nuclear facility in Natanz: Stuxnet 0.5.




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //