The Stuxnet worm has generated a lot of media attention and coverage for some of it’s features as well as targets. Joel Langill deconstructs each part of the worm to show it in action. In the second video you’ll see the best practices that InfoSec Institute uses to mitigate this type of infection and security breach. Leave a comment below if you have a specific instruction or ideas of what you’d like to learn in any follow-up or explanations of this video. If you want to know more about SCADA security, attend our SCADA Security Boot Camp.
Source: https://thehackernews.com/2011/03/stuxnet-worm-revealed-installation.html

