Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Stuxnet worm targets Iran nuclear plant
Monday - 9/27/2010, 4:33pm EDT
This time the target was an Iranian nuclear power plant, fueling rumors that Stuxnet was designed to attack Iranian nuclear facilities, Wall Street Journal reports.
So far, 60 percent of the Stuxnet attacks have been directed at Iranian targets.
The worm is capable of taking over control systems and, more importantly, can uncover information about how things are made at the manufacturing level.
Stuxnet has targeted the Siemens industrial control systems used in Iran's and other countries' facilities by exploiting a security gap in Microsoft Windows. Siemens AG and Microsoft Corp. have issued patches to close that gap.
The Department of Homeland Security has been tracking Stuxnet for months and said the worm is spread from computer to computer using widely available portable memory devices.
The worm represents the first publicly acknowledged set of attacks targeting computer -control systems.
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.