The U.S. Department of Homeland Security is probing Siemens' technology that may allow hackers to attack critical infrastructure, such as power plants.
Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
Researchers had planned to demonstrate how to break into critical infrastructure systems.
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
FireEye Malware Intelligence Lab researchers say they made a mistake in saying Gauss-infected machines were being directed to servers used by Flame.
What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common?
Symantec says threat could be precursor to attacks on industrial control systems much like Stuxnet was.
The New York Times is reporting today, citing a host of sources, that the Obama administration pressed forward with Stuxnet's attack on Iran and has used cyberwarfare extensively.