Stuxnet articles over last 30 days

- articles last 30 days - articles per day
Mentioned in this news Places Companies People
2014/10/30 16:39
2014/10/30 16:39
1m
A European Union cyber-security agency was in Athens to conduct the largest exercise ever held on the continent to prevent attacks on Europe's public utilities and communications networks. The...
2014/10/30 16:39
2014/10/30 16:39
Latest videos
2014/10/30 16:34
2014/10/30 16:34
1m
AFPA majority of cybersecurity experts surveyed in a poll see a likelihood of major damage from a cyber attack in the coming years, according to a Pew Research Centre report. Washington - Cyber...
2014/10/30 14:27
2014/10/30 14:27
1h
ANKARA (Reuters) - Iran has foiled an attempt to sabotage tanks used for transporting heavy water, which is needed to run some nuclear reactors, and blames a "foreign country" for the incident, a...
2014/10/30 14:16
2014/10/30 14:16
1h
North American utilities are scouring their systems for signs of Russian malware that the U.S. government has warned could give hackers control of water treatment facilities and parts of the...
2014/10/30 13:53
2014/10/30 13:53
1h
Yusef Jalali, Press TV, Tehran Cyber space has pervaded the social, economic, and political aspects of our lives. The essence of this ubiquitous, fast-growing phenomenon and its genius lies in the...
2014/10/30 10:22
2014/10/30 10:22
5h
Iran's Bushehr nuclear facility. (illustrative only)Photo Credit: Mehr Iran claims to have foiled a sabotage attack on tanks used to transport “heavy water” – a key component in nuclear...
2014/10/30 01:52
2014/10/30 01:52
13h
Jeff Gelles, Inquirer Business Columnist Last updated: Wednesday, October 29, 2014, 9:16 PM Posted: Wednesday, October 29, 2014, 1:40 PM Rainie said many experts cited the Stuxnet worm as an example...
2014/10/29 21:46
2014/10/29 21:46
17h
Breach: A computer network used by senior staff at the White House was recently attacked. Photo: Reuters Hackers recently breached an unclassified computer network used by President Barack Obama's...
2014/10/29 15:34
2014/10/29 15:34
1d
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy. "Multiple companies working with ICS-CERT have...
2014/10/29 02:38
2014/10/29 02:38
1d
The government of Russian Prime Minister Vladimir Putin, left, is being accused by German security firm G Data of creating and distributing malware. Here, Putin, Gazprom Chief Executive Officer Alexei...
2014/10/29 02:38
2014/10/29 02:38
1d
Iran's president, Mahmoud Ahmadinejad (center), visits the Natanz uranium enrichment facilities. Getty Images Cybersecurity professionals -- especially in Iran -- woke up today to the latest twist in...
2014/10/29 02:38
2014/10/29 02:38
1d
Malicious software designed to steal sensitive information from businesses and foreign governments is made in Russia and supported by the Russian government, a security research firm reported...
Read more at CNET, + 11 more articles
2014/10/25 23:37
2014/10/25 23:37
4d
Only the installations of anti-aircraft guns dotted among the dry tufts of desert grass, where some soldiers hang their washing out to dry beside the artillery batteries, hint at the controversial...
2014/10/22 12:35
2014/10/22 12:35
8d
Cyber weapons hold ‘no taboo’ for statesSecurityby Jimmy Nicholls| 22 October 2014Ex-NSA lawyer outlines vision of cyber war. A former general counsel for the NSA has warned that there is "no taboo"...
2014/10/22 11:43
2014/10/22 11:43
8d
During a brief stint in Paris to visit customers and before hosting Mentor Graphics' Integrated Electrical Solutions Forum (IESF Europe) in Munich, CEO Wally Rhines delivered a keynote speech to share...
2014/10/22 04:16
2014/10/22 04:16
8d
ANKARA (Reuters) - Iranian security services have arrested several suspected spies in the southern province of Bushehr where the country's first nuclear power plant is located, the semi-official Fars...
2014/10/17 12:56
2014/10/17 12:56
13d
SINGAPORE: While there are the Geneva Conventions to turn to when there are wars between states or armed conflict, there are no such rules governing the online space, said Professor Isaac Ben-Israel,...
2014/10/16 17:45
2014/10/16 17:45
13d
At the July 2011 TEDGlobal conference, TED Fellow Lucianne Walkowicz discussed how the Kepler mission has helped us discover many new, far-away planets that might be habitable. Berkeley Bionics'...
2014/10/16 17:29
2014/10/16 17:29
13d
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that...
2014/10/16 14:39
2014/10/16 14:39
14d
Unwanted intruders are finding it more and more difficult to hack computer systems and networks thanks to today's advanced detection technologies. With the help of emulation-based technologies, many...
2014/10/30 16:39
2014/10/30 16:39
Latest from Twitter