Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » S »


Stuxnet is a family of cleverly written malware worms that primarily target SCADA (Supervisory Control and Data Acquistition) control systems for large infrastructures such as industrial power plants. The original Stuxnet worm was first discovered in 2010, and numerous variants of Stuxnet have been identified since then, with most targeting organizations in the country of Iran. 

Stuxnet initially spreads via infected removable drives, particularly USB flash drives, before utilizing additional methods to infect other computers on private networks.  The original Stuxnet worm was designed to exploit four zero-day attack vulnerabilities in Microsoft Windows operating systems.

Some computer security experts believe that an attack as sophisticated as Stuxnet could have only been conducted with "nation-state support," although there haven’t been any confirmations to date as to which country or countries might have been involved in developing Stuxnet.

The Problem with Statistics

We look at a few of the more troubling aspects of statistics and how these may be used to advance an agenda or skew the facts to someone's... Read More »

29 Free Android Apps for Cash-Strapped Students

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »

Sharing Threat Intelligence

A growing number of startups make the sharing of threat intelligence a key part of their solutions. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

Computer Architecture Study Guide

This Webopedia  study guide describes the different parts of a computer system and their relations. Read More »