'Your papers, please' must never be heard in America
Independent voices from the TWT Communities
The sophisticated cyberweapon which targeted an Iranian nuclear plant is older than previously believed, an anti-virus company said Tuesday, peeling back another layer of mystery on a series of attacks attributed by many to U.S. and Israeli intelligence.
If a day without Wikipedia was a bother, think bigger. In this plugged-in world, we would barely be able to cope if the entire Internet went down in a city, state or country for a day or a week.
Egyptian anti-regime activists found a startling document last month during a raid inside the headquarters of the country's state security service: A British company offered to sell a program that security experts say could infect dissidents' computers and gain access to their email and other communications.
"To me, it's amazing," said Mikko Hypponen, whose Finland-based F-Secure has studied Stuxnet. "We had no idea the U.S.-Israel cyberoperations were so advanced already almost a decade ago."
Still, Stuxnet could not have worked without detailed intelligence about Iran's nuclear program that was obtained through conventional spycraft, said Mikko Hypponen, chief research officer at F-Secure, a digital security company in Helsinki, Finland.