SCADA

682e0e796084e163c5ca053dd8573b0c

SCADA and ICS Security: Welcome to the Patching Treadmill

March 15, 2013 Added by:Eric Byres

After Stuxnet, security researchers and hackers on the prowl for new targets to exploit shifted their efforts to critical industrial infrastructure. Unfortunately, the SCADA and Industrial Control Systems applications they are now focusing on are sitting ducks.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Symantec Uncovers Earliest Known Version of Stuxnet (Version 0.5)

February 26, 2013 Added by:Mike Lennon

According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.

Comments  (0)

Da3ca2c61c4790bcbd81ebf28318d10a

APT1: The Good, The Bad, and The Ugly

February 21, 2013 Added by:Krypt3ia

I believe that Mandiant published the APT1 report primarily as a means of advertising and not much else. There is talk of the release being given the tacit nod by the government to push through the idea that there is a problem and that China is robbing us blind.

Comments  (3)

682e0e796084e163c5ca053dd8573b0c

iPhones Are Coming to the Plant Floor – Can we Secure Them?

February 20, 2013 Added by:Eric Byres

Like icebergs, mobile technology has become an unstoppable force of nature. They have invaded the corporate office – is the plant floor the next frontier? What is your company doing about mobile devices on the plant floor? Does it have a strategy?

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)

682e0e796084e163c5ca053dd8573b0c

Time to Speak Up on New IF-MAP Specs for ICS and SCADA Security

February 12, 2013 Added by:Eric Byres

Something I believe industry urgently needs is better standards for information exchange between security solutions. Unfortunately while TCG has had feedback from the IT community, they have received little from the SCADA or ICS community. I encourage everyone involved with SCADA and ICS security to review the specification.

Comments  (0)

A58bf865b185e0e3f665473bf8f3ca6d

Bit9 Suffers Breach After Failing to Follow Corporate Policy

February 11, 2013 Added by:Steve Ragan

If you need a one off example this week of why internal policies are important, or why failure to adhere to them could spell trouble, look no further than Bit9.

Comments  (0)

Default-avatar

Network Security Dark Space: What You Don’t Know Can Hurt You

February 11, 2013 Added by:Infosec Island

Dark space is everywhere – it’s a major challenge to security teams everywhere. The good news is the problem can be solved, and complete coverage can be achieved.

Comments  (0)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

SCADA Security Directions for 2013 - How Will ICS and SCADA Security Change in 2013?

February 01, 2013 Added by:Eric Byres

You see, every January I get asked to make between three and five predictions for the upcoming year. Then every December people remind me that I made those predictions 12 months ago. Then they get to tell me how poorly I did.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Security Analytics: Hype or Huge?

February 01, 2013 Added by:Simon Moffatt

This complex chain of correlated "security big data", can be used in a manner of ways from post-incident analysis and trend analytics as well as for the mapping of internal data to external threat intelligence. Big data is here to stay and security analytics just needs to figure out the best way to use it...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Case for National Cyber Labs

January 31, 2013 Added by:Don Eijndhoven

Cyber Ranges as these networks are now often referred to, are fun! And they’re extremely useful in developing real-world skills without disappearing behind bars. It’s not even a new idea; various militaries have been doing it for a while now...

Comments  (0)

Default-avatar

UPnP Security Flaws Expose 40-50 Million Networked Devices

January 29, 2013 Added by:Infosec Island

Researchers at Rapid7 have uncovered that roughly 40-50 million network-enabled devices are at risk due to vulnerabilities in the Universal Plug and Play (UPnP) protocol.

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Trojans for the Bundestag – German PD acquired Finfisher

January 29, 2013 Added by:Don Eijndhoven

German political platform NetzPolitik.org has now uncovered secret documents belonging to the Ministry of Finance, that the Ministry of the Interior sent to the Bundestag (the political seat of Germany) that reveals the German Federal Police’s intention to use Gamma Group’s Finfisher spyware...

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

8a958994958cdf24f0dc051edfe29462

A New Way of Detecting Cybersecurity Attacks

January 04, 2013 Added by:Larry Karisny

Current IDS solutions have high instances of false positives and true negatives and are extremely costly to maintain. Current IDS solutions were not designed for today's hyper connected business processes with high volume of instances. Attempting to detect misuse or anomalous behaviors requires infinite numbers of rules, patterns or algorithms, which is not possible, and is therefore the cause of ...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »