Linked by Thom Holwerda on Mon 28th May 2012 23:32 UTC
Privacy, Security, Encryption "A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation. The malware, discovered by Russia-based anti-virus firm Kaspersky Lab, is an espionage toolkit that has been infecting targeted systems in Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories and other countries in the Middle East and North Africa for at least two years. Dubbed 'Flame' by Kaspersky, the malicious code dwarfs Stuxnet in size." Since I'm not particularly well-versed in the subject, maybe someone can answer this question for me: if country A creates a malware infection like this to spy on and/or harm computers in country B, can it be construed as an act of war under existing international law?
Permalink for comment 519841
To read all comments associated with this story, please click here.
Member since:

What was Iran thinking when they were using the software of the enemy?
How many (intentional or unintentional) "bugs" are left that allow remote control for computers in Iran?

This is the key question. Why would they use MS Windows for anything important?

I mean, use windows on your gaming rig, and custom Linux distribution on computers that control sensitive industrial/military equipment.

Reply Parent Score: 4