Stuxnet articles over last 30 days

- articles last 30 days - articles per day
Mentioned in this news Places Companies People
2015/01/29 03:46
2015/01/29 03:46
1d
Inside the United States' National Cybersecurity and Communications Integration Centre. Photo: Reuters With repercussions from the Sony Entertainment hack continuing to echo around the world, the US...
2015/01/29 03:46
2015/01/29 03:46
Latest videos
2015/01/28 18:56
2015/01/28 18:56
2d
The threat posed by cyber war to our increasingly complicated, technologically dependent and vulnerable financial institutions, markets, banks and indeed deposits becomes more clear by the...
2015/01/27 22:20
2015/01/27 22:20
3d
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government...
2015/01/27 18:40
2015/01/27 18:40
3d
Most people have heard of the cyber attacks that led to the leak of tons of consumer data from places like Target and Home Depot, or the hack on Sony and its results. Some people may remember the...
2015/01/25 17:42
2015/01/25 17:42
5d
David Jevans is the CEO of Marble Security and chairman of the Anti-Phishing Working Group. It is inevitable that the United States government will fund a cyberwarfare capability, as discussed in...
2015/01/24 15:39
2015/01/24 15:39
6d
VIEW ALL PHOTOS IN GALLERY I had high hopes for Blackhat, Hollywood's latest attempt to turn the fascinating world of computer crime into a drama for mainstream audiences. There was reason to be...
2015/01/21 07:58
2015/01/21 07:58
9d
Son of Agent.btz that stalked US military in 2008 still knocking about, researchers confirm Security experts seem no nearer to confirming the nation state behind the long-running Uroburos (aka...
2015/01/20 16:34
2015/01/20 16:34
10d
Zero-Day vulnerabilities are also often sold on the black market to the highest bidder, suggesting the attackers were either well-funded or working with an entity who is, such as a nation-state. It...
2015/01/18 22:45
2015/01/18 22:45
12d
SNP, Green Party and Plaid Cymru want rid of nuclear subs – and could soon hold the balance of power, writes Pat Kane TO MANY long-term peace activists, I am sure this all comes as a considerable and...
2015/01/16 22:40
2015/01/16 22:40
14d
The Chinese government reaches out to the FBI to investigate malware that crippled a nuclear reactor in China. "We go head-to-head with the Chinese every day. It won't be a bad idea to work with them...
2015/01/16 18:00
2015/01/16 18:00
14d
Director Michael Mann has been fascinated by the world of cybercrime since 2010, when the Stuxnet virus made headlines. After reading Kevin Poulsen's Kingpin, Mann met with the author, and the seed...
2015/01/16 12:43
2015/01/16 12:43
14d
I became interested in computer security in 1989 when my computer was infected with the ‘Cascade’ virus. I was a young software engineer, and managed to get rid of it. That’s when computer security...
2015/01/15 17:20
2015/01/15 17:20
15d
Among the dispositions shared by the two conservatives was a determination to stay out of other people’s wars. Peering into 2015, there are wars into which our interventionists are eager to plunge...
2015/01/14 17:13
2015/01/14 17:13
16d
Michael Mann moves with purpose. His compact frame exudes a coiled energy as he swiftly crosses his Santa Monica offices on a recent afternoon, taking a break from final adjustments on "Blackhat," a...
2015/01/14 15:17
2015/01/14 15:17
16d
Hackers have destroyed a real world target for the second time, using a weaponised email to create havoc at a German steel mill. The attackers managed to switch on a furnace at the facility, causing...
2015/01/14 05:10
2015/01/14 05:10
16d
... have the right to make dumb jokes." -- Tina Fey I'm a free speech advocate. I've been arrested and I have served jail time for exercising my First Amendment rights. As a reporter, magazine...
2015/01/13 22:19
2015/01/13 22:19
17d
Several photo, video and other media editing programs from software maker Corel contain DLL hijacking vulnerabilities that could allow attackers to execute malicious code on users'...
2015/01/13 12:51
2015/01/13 12:51
17d
House Chairman Calls for Cyber Offense Rules — A Still-Undeveloped Area McCaul in July, 2014. (Bill Clark/CQ Roll Call) From the Sony hack to the @centcom hack, it’s been a newsy period for cyber...
2015/01/12 16:18
2015/01/12 16:18
18d
Two groups of rival hackers have locked horns in the wake of the Charlie Hebdo atrocity. On the other is the famous hackivist collective Anonymous, which is intent on supporting free speech and...
2015/01/11 22:46
2015/01/11 22:46
19d
An unusually detailed account of the secret cyberwar comes in “Countdown to Zero Day,” a new book by Kim Zetter, a reporter for Wired magazine. Through detailed forensic examination of the Stuxnet...
2015/01/29 03:46
2015/01/29 03:46
Latest from Twitter