- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Friday 29 July 2011Stuxnet could evolve into new threat - US
US government cyber security experts are warning that the Stuxnet virus could become more menacing, more than a year after it surfaced in an attack believed to be targeted against Iran's nuclear program. The Department of Homeland Security has spent the past year studying the sophisticated malicious software, the first of its type designed to attack computer systems that control industrial processes, two officials said in testimony prepared for a congressional hearing. Stuxnet targeted industrial control systems sold by Siemens that are widely used around the globe to manage everything from nuclear power generators and chemical factories to water distribution systems and pharmaceuticals plants. "This code can automatically enter a system, steal the formula for the product being manufactured, alter the ingredients being mixed in the product and indicate to the operator and the operator's anti-virus software that everything is functioning normally," the officials said. Roberta Stempfley, acting assistant secretary with the Office of Cyber Security and Communications, and Sean McGurk, director of the National Cybersecurity and Communications Integration Center, testified before a subcommittee of the House Energy and Commerce Committee on Tuesday. While anti-virus companies have since built protection against the Stuxnet virus into their software, DHS officials fear that hackers might build hybrid versions of Stuxnet that could evade detection. "Attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems," they said in their written testimony. Some security experts have said that they believe the United States and Israel designed Stuxnet to attack Iran's nuclear program. Source: stuff.co.nz |