By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security experts such as Bruce Schneier said Stuxnet has introduced a new spate of public questions about covert operations carried out with malware and USB sticks, rather than warships and missiles. There are no ground rules for these kinds of operations, despite the fact that they're being developed and carried out. For computer security professionals, the sophistication, funding and processes behind the development of Stuxnet may not be entirely new, but that combination of elements could be a wake-up call for policy makers.
As more military and intelligence officials talk about offensive capabilities in cyberspace and the acceleration of the development of these capabilities, experts caution that Stuxnet could be the blueprint for future endeavors, and could just as easily be used against the United States and its allies.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal