The Stuxnet worm wasn't the only super secret worm around. Turns out, it had an evil secret twin. According to a report published in Foreign Policy, the original Stuxnet variant was a more sophisticated and potentially more powerful worm than Stuxnet itself.
The older twin targeted centrifuges at the Natanz uranium enrichment plant but did so by blocking the outflow of gas from the cascades of centrifuges, causing pressure to build up and the equipment to become damages. It masked the attack by looping 21 seconds of the system's sensor values so that engineers at the facility wouldn't realize that there was anything wrong.
As FP's Ralph Langner suggests, though, "The dramatic differences between both versions point to changing priorities that most likely were accompanied by a change in stakeholders." In other words, the attackers' posse got bigger.
The discovery of Stuxnet's evil twin makes one thing frighteningly true: there are weapons like these already out there, lurking in the darkness. And we don't know what kind of damage it will do when it is set to go off. [FP]
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more