Would you trust the operation and security of your nuclear facility to Windows, lol?<br><br>Recent news reports link Stuxnet, a highly sophisticated computer worm/root kit, in an attempt to destroy operations at Iran&#39;s Bushehr nuclear reactor.  <br>
<br>Stuxnet&#39;s code exploited four different unpatched Windows vulnerabilities, including Windows print spooler.  Microsoft had known about for at least a year.  &quot;Microsoft confirmed Wednesday that it overlooked the vulnerability when it was revealed last year.&quot;  The code also exploits the same vulnerability that was used to spread the Conficker virus (a.k.a. Downadup).  The Stuxnet exploits other flaws and can be used by attackers to upgrade access privileges on compromised PCs to administrator status.  While Microsoft says it will patch the flaws in a future update -- Microsoft said last week that it has not set a timetable for the fixes.<br>
<br>Sources:<br><br><a href="http://www.computerworld.com/s/article/9187300/Microsoft_confirms_it_missed_Stuxnet_print_spooler_zero_day_">http://www.computerworld.com/s/article/9187300/Microsoft_confirms_it_missed_Stuxnet_print_spooler_zero_day_</a><br>
<br><a href="http://www.pcworld.com/businesscenter/article/205827/was_stuxnet_built_to_attack_irans_nuclear_program.html">http://www.pcworld.com/businesscenter/article/205827/was_stuxnet_built_to_attack_irans_nuclear_program.html</a><br>
<br><a href="http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices">http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices</a><br><br>Picture of Facility&#39;s Control Panel showing Windows Error Message:  <a href="http://www.upi.com/News_Photos/Features/The-Nuclear-Issue-in-Iran/1581/2/">http://www.upi.com/News_Photos/Features/The-Nuclear-Issue-in-Iran/1581/2/</a><br>
<br><br><br>