Critical remotely exploitable Schneider bug threatens industrial plants
Flaw in industrial software could cripple plant operations, however a patch was released weeks ago.
Flaw in industrial software could cripple plant operations, however a patch was released weeks ago.
Researchers uncover well-crafted malware that's designed to disrupt core electricity substation equipment to cause outages.
Researchers from Georgia Tech have demonstrated that it is possible to ransom a water treatment plant by hacking its control systems.
Security flaws, failure to patch, and the use of insecure protocols are contributing to a growing number of weaknesses in systems used to automate critical infrastructure processes, according to a new study by Kaspersky Lab.
Dr. John Halamka has taken to his <a href="http://geekdoctor.blogspot.com/2015/08/the-security-of-medical-devices.html">"Life as a Healthcare CIO" blog</a> to sound the alarm on medical device threats in the wake of the FDA late last week issuing its first cybersecurity warning about a specific medical device.
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">advanced search techniques</a> on Google or Bing is considered suspicious, what does that make <a href="http://www.shodanhq.com/">Shodan</a> users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?
Darlene Storm | 27 Aug | Read more
University researchers have found that HTML5-based mobile apps, which are expected to become more prevalent over the next several years, could add security risks for businesses.
Antone Gonsalves | 17 Jun | Read more
A recent White House report on big data wonders aloud about the capability of sensors and smart meters to turn homes into fish tanks, completely transparent to marketers, police -- and criminals.
Patrick Thibodeau | 03 May | Read more
Data published online by industrial firms could be used to mount a cyber attack against UK critical infrastructure, according to research published by the Institution of Engineering and Technology (IET).
Matthew Finnegan | 07 Feb | Read more
Hackers don't need Stuxnet or Flame to turn off a city's lights, say security experts
John P. Mello | 26 Sep | Read more
Last weekend's high-profile cyberattack against telco Belgacom could have been part of a long-running spying campaign by Britain's GCHQ, German magazine Spiegel Online has suggested after studying documents leaked by Edward Snowden.
John E Dunn | 21 Sep | Read more
Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said
Antone Gonsalves | 05 Sep | Read more
Researchers from the UC Berkeley will present a paper Wednesday at the 22nd USENIX Security Symposium in Washington, D.C., on Wednesday that explores the underground market of spam and abuse on Twitter.
Steve Ragan | 14 Aug | Read more
Researchers from the UC Berkeley will present a paper Wednesday at the 22nd USENIX Security Symposium in Washington, D.C., on Wednesday that explores the underground market of spam and abuse on Twitter.
Steve Ragan | 14 Aug | Read more
Even the most innocuous security processes used for traditional IT systems could spell disaster in an ICS
Antone Gonsalves | 23 May | Read more