Security expert says Stuxnet targeted Iranian nuclear sites

By JPOST.COM STAFF
November 20, 2010 13:15

 
X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For a symbolic $5 a month you will receive access to the following:

  • A user uxperience almost completely free of ads
  • Access to our Premium Section and our monthly magazine to learn Hebrew, Ivrit
  • Content from the award-winning Jerusalem Repor
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Don't show it again

The German computer security expert who first reported that the Stuxnet worm was designed to attack targets in Iran said the virus specifically attacked the country's nuclear program, in a report posted Friday.

In his analysis, Ralph Langner said Stuxnet contained two distinct "digital warheads," specifically designed to attack military targets - Uranium enrichment plants and the Bushehr nuclear power plant.


Related Content

Breaking news
June 25, 2018
Libyan coastguard picks up almost 1,000 migrants in one day

By REUTERS