Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
Iran claims to have been targeted by second worm
If a statement from Gholam-Reza Jalali – the head of Iran’s Passive Defense Organization – is to be believed, it seems that Iran’s computers have been …
U.S. federal lab linked to Stuxnet breached
A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet …
Dramatic increase in cyberattacks on critical infrastructure
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
Israeli general claims Stuxnet attacks as one of his successes
The latest results of a Symantec study concentrating on the Stuxnet worm revealed that its developers knew what they were doing – once finished, it took only 12 hours to …
What Stuxnet means for the process industry
The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
The shape of security and compliance in 2011
With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Exploit code for still unpatched 0-day used by Stuxnet released
After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA