Codebreaker

Two years later, a bug fix

Marc Sanchez Jul 25, 2012

Seems like only yesterday that Iran was trying to figure out why one of its nuclear enrichment facilities went on the fritz. Nope. That was 2010. Since then, we have learned a little about Stuxnet, the virus that was leaked into the computer systems of the facility – a virus so stealthy and sophisticated that it’s thought to have been created by government intelligence. And now Siemens, the company that makes the software used at the plant (and thousands of other industrial plants across the planet) has come up with a fix. What Stuxnet ultimately did was override commands in the plant, telling machines to spin out of control and never turn off, eventually burning out their motors. Siemens says that it is now able to overcome that loophole. But trouble is always just around the corner.
The BBC writes:

The Siemens update comes as security firm F-Secure received an email believed to have been sent by a scientist working at Iran’s Atomic Energy Organization.
In the message, the scientist said its plants at Natanz and Qom have been hit again by a worm.

We’re here to help you navigate this changed world and economy.

Our mission at Marketplace is to raise the economic intelligence of the country. It’s a tough task, but it’s never been more important.

In the past year, we’ve seen record unemployment, stimulus bills, and reddit users influencing the stock market. Marketplace helps you understand it all, will fact-based, approachable, and unbiased reporting.

Generous support from listeners and readers is what powers our nonprofit news—and your donation today will help provide this essential service. For just $5/month, you can sustain independent journalism that keeps you and thousands of others informed.