U.S. Secretary of State John Kerry, right, speaks with Iranian Foreign Minister Mohammad Javad Zarif, left, at the Intercontinental Hotel, in Geneva,May 30, 2015. (Laurent Gillieron/Keystone via AP)
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
Further research into the sophisticated computer virus used to hack into hotels where the Iran nuclear talks took place has found it took advantage of digital credentials stolen from the world's top contract electronics maker Foxconn.Russian security company Kaspersky Lab said Monday that researchers learned the Duqu 2.0 virus had redirected computer traffic by using a legitimate digital certificate from Taiwan's Hon Hai, also known as Foxconn.The Stuxnet virus took advantage of stolen digital certificates from two other major Taiwanese companies, JMicron Technology Corp and Realtek Semiconductor Corp, Kaspersky said in a report it published in 2010 .Kaspersky said it had notified Foxconn of the stolen credentials.
FOLLOW THIS ARTICLE