“Oh don’t worry,” your uncle said when you were shopping for a new computer. “Macs are virtually virus proof.” Your uncle was wrong.
Sometimes being an intensely secretive regime trading in relentless obscurity has its perks: The US tried to secretly attack North Korea’s nuclear program with a computer virus, but failed because it couldn’t find the information necessary to infect the North Korean system with a virus.
At this point, it's obvious that cyberattacks can have devastating, far-reaching consequences. Look at the fallout from the Sony hack. But it's still very rare for digital aggression campaigns to cause direct physical damage, which is why a recent cyberattack that screwed with a blast furnace at a German steel mill is…
Last year, we discovered that Iranian hackers had breached Navy computer systems, which sent an understandable wave of panic through the administration. But it looks like that might've just been the tip of a much bigger, more sophisticated and more deadly iceberg.
It's been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.
There's a common misconception that you need to be connected to the internet to get infected with malware. Well, that's not true and, according to renowned cybersecurity expert Eugene Kaspersky, the folks at a nuclear power plant in Russia learned this the hard way.
The NY Times is reporting that unknown computer hackers who call themselves "Cutting Sword of Justice" have claimed responsibility for spreading a malicious virus into Saudi Aramco, the Saudi government-owned oil company that's also the world's largest, and destroying three-quarters of all its computers. The hackers…
Earlier this year, a devastating virus dubbed Flame made its way through power plants in Iran, wreaking havoc on system software, and prompting the country to disconnect itself from the internet. Now comes word from Kaspersky Labs that there's a copycat virus doing the same thing to "at least one organization in the…
After being dominated by weaponized trojan horses on two different occasions, nuclear loudmouth Iran says it's had enough: it's unplugging from the Internet, hiding, and making its own.
It's a scenario security researchers have long worried about, a man-in-the-middle attack that allows someone to impersonate Microsoft Update to deliver malware - disguised as legitimate Microsoft code - to unsuspecting users.
A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation.
The malware, discovered by Russia-based anti-virus firm Kaspersky Lab, is an espionage toolkit that has been…
A newly surfaced version of the Duqu trojan indicates that the authors of one of the most sophisticated computer worms in recent memory are aggressively trying to figure out how to attack their next target.
When Kaspersky Labs revealed its analysis of the Duqu Trojan earlier this month they were stumped by a block of code that appeared to be a previously unseen programming language. With the help of the Internet, Kaspersky's identified the code, not as a new computer language, but rather, an old one.
The Duqu Trojan is one nasty piece of code, rivaled in sophistication only by its relative, the Stuxnet Worm. A new analysis of the Trojan, however, has revealed just how advanced it really is.
The Conficker worm was one of the more intriguing and potentially destructive pieces of malware in the past decade. Earlier reports have suggested that Stuxnet was created by the U.S. and Israeli governments, and now Reuters has a source telling them Conficker was also used to negate Iran's nuclear program.
Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers.