On 1 June 2012, an article in The New York Times said that Stuxnet is part of a US and Israeli intelligence operation called "Operation Olympic Games", started under President George W. reported how the Atomic Energy Organization of Iran e-mailed F-Secure's chief research officer Mikko Hyppönen to report a new instance of malware.
Kaspersky updating agent Mobi in sex
If you choose to participate, the online survey will be presented to you when you leave the Technet Web site.
Stuxnet is a malicious computer worm, first uncovered in 2010 by Kaspersky Lab.
Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.
Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern supervisory control and data acquisition (SCADA) and PLC systems (e.g., in factory assembly lines or power plants), the majority of which reside in Europe, Japan and the US.
Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, preventing detection of the presence of Stuxnet.