website statistics

Your Gadget shopping list for Holiday?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Iran has for long decried that a number of cyberattacks have been launched against it by Israel and US but so far, the latter two have always denied having done so. Iranian facilities and computers have been targeted in the past with some of the most sophisticated worms. Now, it has been revealed that U.S. was very actively involved in the whole saga.

New York Times interviewed a number of officials involved in ‘Olympic Games’, the code name for a project that was launched during the days of Bush administration and actually revolved around launching cyber attacks against Iranian nuclear program.

According to the NYT report, one of the most notorious worms we have known to date, Stuxnet, was also actually aimed at Iranian machines but due to a slight programming glitch, the worm entered the web and started infecting systems worldwide.

When this leak happened, the Obama administration brought together a high profile meeting where President Obama discussed the possible repercussions of Stuxnet’s leak. However, when he was told that Stuxnet has been able to successfully target and infect Iranian machines, he permitted the project to continue.

Soon after, Iran’s Natanz plant was hit with multiple cyber attacks. One of these attacks was so effective that it was able to take out 1,000 out of 5,000 centrifuges in Iran. So far, US government has been steadily denying any use of cyber weapons. But this NYT report quite squarely shows that US and Israel have been using cyber weapons and cyber attacks to target machines in Iran, a venture that has incidentally wrecked havoc on the entire web more than once.

Recently, another notorious malware, the likes of which haven’t been seen before, has been found by Kaspersky Labs. It has been named ‘Flame’ and it is being suspected that again, US government is behind this malware since a malware of such complexity and functionality can’t be engineered by a hacker or a small group of hackers.

Source: New York Times

Buy Cheapest Related Product From

What Will Happen To Julian Assange Once He Reaches Sweden?

Undergrad Student At University Of Nebraska Was Involved In Data Breach
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 2, 2012(3 years, 6 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook