Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
The U.S. Department of Homeland Security is probing Siemens' technology that may allow hackers to attack critical infrastructure, such as power plants.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
Symantec says threat could be precursor to attacks on industrial control systems much like Stuxnet was.
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common?
FireEye Malware Intelligence Lab researchers say they made a mistake in saying Gauss-infected machines were being directed to servers used by Flame.
The security expert who first identified Iran as the target for Stuxnet talks about why he thinks the U.S. and Israel are behind it and why we should fear copycats.
Researcher opens "can of worms" about security weaknesses in systems running critical infrastructure environments, expert says.