New York Times reporter David Sanger worked extensively with former deputy CIA director Michael Morell during the reporting of his book Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power—even arranging to provide Morell with access to an entire unpublished chapter for his review—according…
Alex Gibney, the famed documentarian behind the the jaw-dropping film Going Clear that investigated the Church of Scientology, has a new movie that explores Stuxnet, a piece of Malware created by the United States and Israel to take down Iranian nuclear facilities. The director just sent Gizmodo his latest trailer.
Government-sponsored hackers are using a clever trick to attack critical infrastructure like nuclear power plants, dams, and oil refineries. According to Eric Knapp, chief cybersecurity engineer at Honeywell, one third of malware found in critical infrastructure came from USB drives plugged in by users.
“Oh don’t worry,” your uncle said when you were shopping for a new computer. “Macs are virtually virus proof.” Your uncle was wrong.
Sometimes being an intensely secretive regime trading in relentless obscurity has its perks: The US tried to secretly attack North Korea’s nuclear program with a computer virus, but failed because it couldn’t find the information necessary to infect the North Korean system with a virus.
At this point, it's obvious that cyberattacks can have devastating, far-reaching consequences. Look at the fallout from the Sony hack. But it's still very rare for digital aggression campaigns to cause direct physical damage, which is why a recent cyberattack that screwed with a blast furnace at a German steel mill is…
Last year, we discovered that Iranian hackers had breached Navy computer systems, which sent an understandable wave of panic through the administration. But it looks like that might've just been the tip of a much bigger, more sophisticated and more deadly iceberg.
Kim Zetter is here to answer all of your questions about computer crimes and security, Stuxnet and digital warfare, online surveillance and privacy, and how living online is changing the world.
It's called "Snake" and it's being compared to another alleged state-run virus, Stuxnet. And yes, all evidence points to Russia.
Life just got a bit tougher for cyber saboteurs and hackers. A pair of researchers have formulated an algorithm that can predict the optimal time for unleashing specific weapons during a cyber attack.
It's been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.
The problem with creating Stuxnet, the world's most sophisticated malware worm, is that it could eventually go rogue. Which is precisely what has happened. The US- and Israeli-built virus has spread to a Russian nuclear plant — and even the International Space Station.
There's a common misconception that you need to be connected to the internet to get infected with malware. Well, that's not true and, according to renowned cybersecurity expert Eugene Kaspersky, the folks at a nuclear power plant in Russia learned this the hard way.
The NY Times is reporting that unknown computer hackers who call themselves "Cutting Sword of Justice" have claimed responsibility for spreading a malicious virus into Saudi Aramco, the Saudi government-owned oil company that's also the world's largest, and destroying three-quarters of all its computers. The hackers…
Earlier this year, a devastating virus dubbed Flame made its way through power plants in Iran, wreaking havoc on system software, and prompting the country to disconnect itself from the internet. Now comes word from Kaspersky Labs that there's a copycat virus doing the same thing to "at least one organization in the…
After being dominated by weaponized trojan horses on two different occasions, nuclear loudmouth Iran says it's had enough: it's unplugging from the Internet, hiding, and making its own.
It's a scenario security researchers have long worried about, a man-in-the-middle attack that allows someone to impersonate Microsoft Update to deliver malware - disguised as legitimate Microsoft code - to unsuspecting users.
A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation.
The malware, discovered by Russia-based anti-virus firm Kaspersky Lab, is an espionage toolkit that has been…