News Stay informed about the latest enterprise technology news and product updates.

Schneier on Stuxnet malware analysis

Security luminary Bruce Schneier said Stuxnet has introduced a new spate of public questions about covert operations carried out with malware and USB sticks, rather than warships and missiles.

Experts who have conducted Stuxnet analysis say the malware's emergence last summer reinforced interest in critical infrastructure protection and imprinted targeted attacks against organizations back into the mindset of information security professionals. Stuxnet went after vulnerabilities in process control systems manufactured by Siemens that were running inside an Iranian uranium enrichment center. It is believed to be a joint U.S.-Israel project, according to published reports. The goal of the initiative was to destroy or delay Iran's ability to build nuclear weapons, which by all means it did by up to five years.

Security experts such as Bruce Schneier said Stuxnet has introduced a new spate of public questions about covert operations carried out with malware and USB sticks, rather than warships and missiles. There are no ground rules for these kinds of operations, despite the fact that they're being developed and carried out. For computer security professionals, the sophistication, funding and processes behind the development of Stuxnet may not be entirely new, but that combination of elements could be a wake-up call for policy makers.

As more military and intelligence officials talk about offensive capabilities in cyberspace and the acceleration of the development of these capabilities, experts caution that Stuxnet could be the blueprint for future endeavors, and could just as easily be used against the United States and its allies.

Dig Deeper on Malware, virus, Trojan and spyware protection and removal

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close