Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Stuxnet attack=== In 2010, the computer worm known as [[Stuxnet]] reportedly ruined almost one-fifth of Iran's [[nuclear centrifuge]]s.<ref>{{cite web |url=http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 |title=The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought |website=Business Insider |date=20 November 2013 |url-status=live |archive-url=https://web.archive.org/web/20140509020404/http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 |archive-date=9 May 2014 }}</ref> It did so by disrupting industrial [[programmable logic controller]]s (PLCs) in a targeted attack. This is generally believed to have been launched by Israel and the United States to disrupt Iran's nuclear program<ref>{{cite news |url=https://www.cbsnews.com/news/stuxnet-worm-a-us-cyber-attack-on-iran-nukes/ |title=Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes? |work=CBS News |first=Tucker |last=Reals |date=24 September 2010 |url-status=live |archive-url=https://web.archive.org/web/20131016133651/http://www.cbsnews.com/8301-501465_162-20017507-501465.html |archive-date=16 October 2013 }}</ref><ref>{{cite magazine |url=https://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe |title=Cyberwar Issues Likely to Be Addressed Only After a Catastrophe |date=17 February 2011 |first=Kim |last=Zetter |magazine=Wired |access-date=18 February 2011 |url-status=live |archive-url=https://web.archive.org/web/20110218154415/http://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe/ |archive-date=18 February 2011 }}</ref><ref>{{cite web |url=http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 |title=Cone of silence surrounds U.S. cyberwarfare |date=18 October 2011 |first=Chris |last=Carroll |publisher=Stars and Stripes |access-date=30 October 2011 |url-status=live |archive-url=https://web.archive.org/web/20120307021747/http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 |archive-date=7 March 2012 }}</ref><ref>{{cite web |url=http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf |title=Computers as Weapons of War |date=27 April 2010 |first=John |last=Bumgarner |publisher=IO Journal |access-date=30 October 2011 |archive-url=https://web.archive.org/web/20111219174833/http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf |archive-date=19 December 2011 }}</ref> β although neither has publicly admitted this.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)