Blog Posts Tagged with "LAN"

E595c1d49bf4a26f8e14ce59812af80e

Who is Your Machine Talking To?

April 13, 2012 Added by:Patrick Oliver Graf

Network connections that communicate with machine-to-machine (M2M) management platforms are especially prone to attacks, in part because the M2M systems primarily communicate via Wi-Fi networks and 2 or 3G connections...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Understanding Industrial Control System Vulnerabilities

March 21, 2012 Added by:Infosec Island Admin

A mission-critical control system is typically configured in a fully-redundant architecture allowing quick recovery from loss of various components in the system. A backup control center is used in more critical applications to provide a secondary control system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TDSS Rootkit Boasts Self-Propagating Mechanisms

June 07, 2011 Added by:Headlines

"If the victim computer is located on a network using the DHCP protocol, the worm starts scanning the network to see if there are any available IP addresses. After that, the worm launches its own DHCP server and starts listening to the network..."

Comments  (0)