For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, the big question is: How will industry respond?
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
Stuxnet kicked things off, and since then, there's been an explosion in sophisticated viruses targeting businesses and critical infrastructure in the Gulf region. But, prevention is still an option.
The third and final presidential debate was heavy on the kinetic and light on the cyber. And it shouldn't have surprised anybody.
Researchers have discovered three new malware strains linked with the Flame virus, and noted an even higher number of victims than expected.
The Wiper virus has left few clues for researchers to study, but there may be similarities between it and other malware targeting systems in the Middle East.
While the investigation is just beginning into the massive espionage toolkit known as Flame, which has targeted computers, mainly in Iran, it is important to consider the consequences of this malware.
Just when you thought all of the windows that control system recon trojan Duqu used to propagate had been roped off, the software giant releases a new set of fixes.
The year's first variant of the notorius W32.Duqu, a trojan that seems intended for cyber war, has been discovered by Symantec researchers.
Hacker groups Anonymous and LulzSec have made a name for themselves by scanning large organizations until they find the one weak system ready to be exploited. You can prevent an attack.
Tuesday's baker's dozen of security patches from Microsoft includes a fix for a vulnerability that helped spread the dangerous information-stealing Duqu trojan, which targets industrial control systems.
Microsoft on Tuesday is scheduled to release 14 patches to fix 20 vulnerabilities across its product line.
On Oct 20, just two days after researchers released details about the Duqu malware, its creators scrubbed all the files from their command-and-control servers in an effort to conceal their identity.
The Hungary-based research lab responsible for detecting the Duqu trojan has released a toolkit to find traces of the trojan on a computer or in a whole network.
Three U.S. Air Force information security experts, independent of their role in the military, studied the Duqu trojan, and you might be surprised by what they found. This is the second article in a two-part series that examines the sophisticated threat that everyone is talking about.
Microsoft on Tuesday patched one "critical" vulnerability, plus three other less-severe flaws. Not patched, as expected, is a bug related to the Duqu trojan.
The security industry, and the media that covers it, would be better served focusing on the tried-and-true motives for cybercrime, not conspiracy theories.
Microsoft issued a temporary fix for a vulnerability in the Windows kernel used to spread Duqu, the so-called "son of Stuxnet" trojan.
Three out of every four new malware strains created during the third quarter was a trojan, says a new report from PandaLabs.
Microsoft is prepping four security bulletins for its November update, though it is not expected to provide a fix for the zero-day flaw used to spread Duqu.
Three U.S. Air Force information security experts, independent of their role in the military, studied the Duqu trojan, and you might be surprised by what they found. This is the first article in a two-part series that examines the sophisticated threat that everyone is talking about.
A piece of malware that has drawn comparisons to the notorious Stuxnet worm is using an unknown Windows kernel vulnerability to infect its targets.