Industrial control systems such as SCADA systems sit squarely at the intersection of the digital and physical worlds. They're vulnerable, they're unpatchable, and they're connected to the Internet.
Friend and colleague Professor Michael Miora, CISSP-ISSMP, FBCI has contributed the following interesting case study to the series of columns on the security of supervisory control and data ...
A risk assessment, combined with a vulnerability assessment and threat scenario analysis, specifically identifies cyber vulnerabilities that may require elimination from a pipeline system. Elimination ...
In this second of two reports, we continue with a summary of the January 2006 BlackHat Federal Conference presentation by David Maynor, who was at that time an R&D research engineer for Internet ...
Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue With cyber-attacks fast becoming the weapon of choice to compromise ...
Threats to aging supervisory control and data acquisition (SCADA) systems, which monitor and control key industrial processes in critical infrastructure, have been growing in recent years. The latest ...
A recent batch of vulnerabilities in Honeywell building automation system software epitomize the linger security issues around SCADA and industrial control systems. A handful of worrisome ...
Don’t expect any of these attacks on SCADA and ICS to slow any time soon. In his talk, “Who’s Really Attacking Your ICS Devices?”, presented recently at Black Hat Europe 2013, Trend Micro Threat ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
An electronic road sign hacked to alert drivers to hoards of the undead provides a nice pedagogical example of why SCADA security is such a "big deal". Earlier this week a road sign was hacked to warn ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback