Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
Despite claims to the contrary, General Keith Alexander argues that the NSA is actually doing its part to protect US citizens.
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
The U.S. Department of Homeland Security is probing Siemens' technology that may allow hackers to attack critical infrastructure, such as power plants.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
Symantec says threat could be precursor to attacks on industrial control systems much like Stuxnet was.
The security expert who first identified Iran as the target for Stuxnet talks about why he thinks the U.S. and Israel are behind it and why we should fear copycats.
Researchers had planned to demonstrate how to break into critical infrastructure systems.
There has never been malware like Stuxnet that targets critical infrastructure and is so sophisticated, Symantec warns Senate committee.