tag
source code

Stuxnet and the DHS

In fact, the real interest of the document lies in the extensive overview (12 closely-typed pages without graphics and such) of the DHS view of its own cybersecurity mission.

Stuxnet, Iran and Anonymous

Links to two Stuxnet-related stories have been added to the resources page at /2011/01/23/stuxnet-information-and-resources-3/. Kim Zetter, in Wired's "Threat Level" column Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant, summarizes the latest update to Symantec's Threat Dossier. Symantec researchers now believe that Stuxnet targeted five organizations in Iran as staging posts

ikee iPhone iWorm iSource: iYukkkkk!!!!

Inevitably, the source code for the ikee worm I mentioned in a previous blog (http://www.eset.com/threat-center/blog/2009/11/10/iworm-ikee-sex-and-drugs-and-rick-and-roll) has crept back out from under its rock. It's probably equally inevitable that there'll be more script-kiddy attempts to produce variants and it will be easier for heavy-duty malware creators to produce new malware using similar techniques, if they're so-minded. If you

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.