Stuxnet

  • Gen. Cartwright: Latest Stuxnet casualty

    These episodes occur regularly, but it’s always hard to watch.

  • Timeline: Cybersecurity Milestones, 2006-2012

    A look at the events shaping cybersecurity policy in the federal government over the past six years.

  • Cyber lab turns to cryptology experts for help

    The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.

  • Stopping Advanced Persistent Threats (APTs)

    T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues. June 26, 2012

  • House intel chairman suggests U.S., Israel not behind cyber attacks on Iran

    House Intelligence Committee Chairman Mike Rogers said he’d be “very careful” about assigning blame for the attacks on Iran’s nuclear program. Half of what’s been reported in the media on the matter is untrue, he said.

  • In Depth interviews – June 19

    On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources. Across-the-board mandatory cuts have a lot of people on edge, especially those who work closely with the Defense Department. Across-the-board mandatory cuts have a lot of people on edge. But some of the rhetoric could be overblown, says Benjamin Friedman, a research fellow in defense and homeland security studies at the Cato Institute.

  • In Depth interviews – June 14

    On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

  • White House directive behind Stuxnet virus

    The New York Times reports the efforts, code name “Olympic Games”, began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.

  • Duqu virus variant emerges

    The Duqu virus, widely known as a “twin” to the Stuxnet worm that targeted Iran’s nuclear infrastructure, is evolving yet again. Software security firm Symantec said the program has a new variant altered “just enough…to evade some security product detections.”

  • Stuxnet offshoot attacking networks

    This virus is installing itself thorough a vulnerability in handling of TrueType fonts.