The sophisticated espionage toolkit known as Flame is directly tied to the Stuxnet superworm that attacked Iran’s centrifuges in 2009 and 2010, according to researchers who recently found that the main module in Flame contains code that is nearly identical to a module that was used in an early version of Stuxnet.
Researchers at Russia-based Kaspersky Lab discovered that a part of the module that allows Flame to spread via USB sticks using the autorun function on a Windows machine contains the same code that was used in a version of
- Information Streams - Going Beyond the Activity Stream - E2 Conference Boston
- How to Choose a SaaS Vendor - E2 Conference Boston
- The E2 Social Business Leaders - E2 Conference Boston - E2 Conference Boston
- Mobile Connect - E2 Conference Boston - E2 Conference Boston
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
- Building a Hybrid Cloud in Government: It's not that Complicated
- Mobile DevOps: Achieving continuous delivery with multiple front ends and complex backends in Banking, Financial Services, and Insurance
- Maximize the benefits of virtualization for greater ROI
- Cloud Security: It’s Not Just for IT Anymore
- How Cloud Facilitates an Agile Contact Center
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue