Expert Bruce Schneier's Stuxnet malware analysis

Expert Bruce Schneier's Stuxnet malware analysis

Expert Bruce Schneier's Stuxnet malware analysis

Date: Mar 03, 2011

In this RSA Conference 2011 interview, security luminary Bruce Schneier, Chief Security Technology Officer of BT Group. Schneier breaks down his Stuxnet malware analysis, discusses who could have benefited from creating Stuxnet, how the main stream media hype affected the Trojan, how it could have been implemented and more. .

See more Bruce Schneier videos:

More on Viruses, worms, spyware, and other malware

  • canderson

    How to use Wireshark to detect and prevent ARP spoofing

    VIDEO - Video: Keith Barker of CBT Nuggets demonstrates how to use Wireshark, the popular open source packet analyzer, to prevent ARP spoofing attacks.
  • canderson

    Malware and email authentication for financial services

    VIDEO - Malware and fighting phishing with email authentication are major security topics for financial services firms. In part two of this video, Paul Smocer discusses the threats and mitigation options.
  • canderson

    Smart tactics for antivirus and antispyware

    VIDEO - AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural perspective. You'll learn the benefits of standalone products vs. integrated suites, where AV and antispyware should sit on the network and how to approach implementation issues.
  • Security must include domain name protection, say experts

    News - Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.

    ( Nov 13, 2014 )

  • WordPress most attacked application

    News - WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.

    ( Oct 30, 2014 )

  • Cyber security failing in execution, says ex-US cyber czar

    News - Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.

    ( Oct 15, 2014 )

  • Apple security depends on users, hack shows

    News - Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.

    ( Oct 03, 2014 )

  • Backoff point-of-sale malware hits over 1,000 businesses

    News - In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.

    ( Sep 05, 2014 )