<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Stuxnet malware story</title>
	<atom:link href="http://www.gfi.com/blog/stuxnet-malware-story/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/stuxnet-malware-story/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=stuxnet-malware-story</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Bob morton from Florida</title>
		<link>http://www.gfi.com/blog/stuxnet-malware-story/comment-page-1/#comment-29449</link>
		<dc:creator>Bob morton from Florida</dc:creator>
		<pubDate>Tue, 02 Aug 2011 15:05:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3403#comment-29449</guid>
		<description><![CDATA[Stuxnet malware is just an evolution of a simple computer virus back in the early 1990s. Technically speaking, it&#039;s like all types of malware in that it infiltrates, attacks, and harms computers. Stuxnet just became famous because it was used to attack one of US&#039; most hated enemies - Iran. 

At that time, this country was branded by former President Bush as forming the &quot;Axis of Evil&quot;. And when Stuxnet became involved in the Bushehr nuclear plant incident, many IT security experts begun to notice and elevated it from the rest of the malwares. And then it was labelled as “cyber super weapon”. 

Today, Stuxnet is constantly evolving. More powerful and destructive that its predecessors.]]></description>
		<content:encoded><![CDATA[<p>Stuxnet malware is just an evolution of a simple computer virus back in the early 1990s. Technically speaking, it&#8217;s like all types of malware in that it infiltrates, attacks, and harms computers. Stuxnet just became famous because it was used to attack one of US&#8217; most hated enemies &#8211; Iran. </p>
<p>At that time, this country was branded by former President Bush as forming the &#8220;Axis of Evil&#8221;. And when Stuxnet became involved in the Bushehr nuclear plant incident, many IT security experts begun to notice and elevated it from the rest of the malwares. And then it was labelled as “cyber super weapon”. </p>
<p>Today, Stuxnet is constantly evolving. More powerful and destructive that its predecessors.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carter Rubens</title>
		<link>http://www.gfi.com/blog/stuxnet-malware-story/comment-page-1/#comment-29424</link>
		<dc:creator>Carter Rubens</dc:creator>
		<pubDate>Fri, 29 Jul 2011 09:09:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3403#comment-29424</guid>
		<description><![CDATA[This is a very sophisticated piece of virus because it goes through all levels till it reaches the hardware itself. There are some other viruses like this targeted at PCs but right now I can&#039;t remember their names. It&#039;s really scary what happens when such a virus gets inside a nuclear power plant, a hospital or any other place where it can literally kill people.]]></description>
		<content:encoded><![CDATA[<p>This is a very sophisticated piece of virus because it goes through all levels till it reaches the hardware itself. There are some other viruses like this targeted at PCs but right now I can&#8217;t remember their names. It&#8217;s really scary what happens when such a virus gets inside a nuclear power plant, a hospital or any other place where it can literally kill people.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: William Goodings</title>
		<link>http://www.gfi.com/blog/stuxnet-malware-story/comment-page-1/#comment-29413</link>
		<dc:creator>William Goodings</dc:creator>
		<pubDate>Thu, 28 Jul 2011 07:19:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3403#comment-29413</guid>
		<description><![CDATA[Search and destroy - this has been the unofficial slogan of Stuxnet malwares. Some IT security experts even even coined the term &quot;cyber super weapon&quot; to mean the purpose of Stuxnet. And they were right. I remembered last year when this malware made headlines because of the Bushehr nuclear plant incident. Even the US&#039; Department of National Defense and Department of State were involved just to sort things out.

Stuxnet is also one of the most powerful malwares (if not the most). It has the capability to infiltrate and attack physical targets such buildings and nuclear power plants. It&#039;s the only malware most effective against cyber warfare.]]></description>
		<content:encoded><![CDATA[<p>Search and destroy &#8211; this has been the unofficial slogan of Stuxnet malwares. Some IT security experts even even coined the term &#8220;cyber super weapon&#8221; to mean the purpose of Stuxnet. And they were right. I remembered last year when this malware made headlines because of the Bushehr nuclear plant incident. Even the US&#8217; Department of National Defense and Department of State were involved just to sort things out.</p>
<p>Stuxnet is also one of the most powerful malwares (if not the most). It has the capability to infiltrate and attack physical targets such buildings and nuclear power plants. It&#8217;s the only malware most effective against cyber warfare.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/stuxnet-malware-story/comment-page-1/#comment-29405</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 25 Jul 2011 14:40:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3403#comment-29405</guid>
		<description><![CDATA[Its impossible to say what the motivation of an attacker might be. However it is safe to say no matter what they intend to achieve it&#039;s in the business&#039;s best interest to prevent the attacker from succeeding.]]></description>
		<content:encoded><![CDATA[<p>Its impossible to say what the motivation of an attacker might be. However it is safe to say no matter what they intend to achieve it&#8217;s in the business&#8217;s best interest to prevent the attacker from succeeding.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Graham Sanford</title>
		<link>http://www.gfi.com/blog/stuxnet-malware-story/comment-page-1/#comment-29398</link>
		<dc:creator>Graham Sanford</dc:creator>
		<pubDate>Sat, 23 Jul 2011 06:39:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3403#comment-29398</guid>
		<description><![CDATA[Very scary stuff when you start realizing that malware can be cleverly exploited to create physical property damage. Really escalates the need for proper security not just in your home but in your country&#039;s government facilities. Think about all the high profile defense contractors and labs that have been hit recently, and it makes you wonder if they were merely after just data or trying to set these kinds of programs in place to do more direct damage.]]></description>
		<content:encoded><![CDATA[<p>Very scary stuff when you start realizing that malware can be cleverly exploited to create physical property damage. Really escalates the need for proper security not just in your home but in your country&#8217;s government facilities. Think about all the high profile defense contractors and labs that have been hit recently, and it makes you wonder if they were merely after just data or trying to set these kinds of programs in place to do more direct damage.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:03:29 by W3 Total Cache --