Storage

04:26 PM
Alison Diana
Alison Diana
Slideshows
Connect Directly
RSS
E-Mail
50%
50%

Top 10 Security Stories Of 2010

As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave
Previous
8 of 10
Next


Like a sci-fi movie come to life, the Stuxnet malware infiltrated computer systems around the world and now at least one expert believes its sole purpose is to bring down Iran's Bushehr nuclear power plant, located about 750 miles away from Tehran and the government of Mahmoud Ahmadinejad. In November, Symantec said the designer must have had significant financial backing to create the necessary test environment to mirror their target and to conduct reconnaissance. Since it was detected in June, international security experts have been scrutinizing the worm, an unusually complex creation with more than 4,000 functions -- comparable to some commercial software. "Each feature of Stuxnet was implemented for a specific reason," said Symantec.

SEE ALSO:

Symantec Finds Stuxnet Targets Iranian Nuclear Enrichment

Smart Grids Offer Cyber Attack Opportunities

Iran Denies Stuxnet Worm Hurt Nuclear Plant

Stuxnet Updates Through P2P Communications

Stuxnet 'Zero Day' Worm Not New

Previous
8 of 10
Next
Comment  | 
Print  | 
More Insights
Hot Topics
5
Do We Need 25 GbE & 50 GbE?
Jim O'Reilly, Consultant,  7/18/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed