Blog Posts Tagged with "Water Control Systems"
January 25, 2012 Added by:Bob Radvanovsky
Curran-Gardner: A contractor for a control systems outsourcing company had accessed one of his customer's systems from a foreign country, only to be confused with a foreign-national actor with malicious intent, but one question still remains: What really happened to the pump?
December 05, 2011 Added by:Headlines
"Publicly disclosing affected identity names and incident information is highly unusual and not part of ICS-CERT's normal incident reporting and triage procedures. In this particular case, because unconfirmed information had already been leaked to the public..."
December 01, 2011 Added by:Headlines
"As we navigate new and uncertain challenges in the digital age, we must also address the growing threat cyberattacks present to our transportation networks, electricity grid, financial systems and other assets... we are committed to protecting our critical infrastructure..."
November 30, 2011 Added by:John Linkous
It’s an all too familiar story; something doesn’t feel right, but confirming whether something has happened, if it is something you should be concerned about, what the vector of the potential attack might be, and what you can do to mitigate the damage is very difficult to pinpoint...
November 30, 2011 Added by:Headlines
"Essentially it was an ego trip for the hacker because he had control of that city’s systems and he could dump raw sewage into the lake, he could shut down the power plant at the mall – a wide array of things..."
November 26, 2011 Added by:Rafal Los
Media reports would lead the outside observer to believe that nothing is being done to improve the state of cybersecurity for our critical infrastructure, and this is completely false. A significant amount of effort is being expended in both improving the security of existing systems...
November 26, 2011 Added by:Infosec Island Admin
Trusted Metrics is hosting a monthly webinar series on Industrial Control System (ICS) Cybersecurity. Each session will speak to the issues faced by those operating and building industrial facilities. This session will be addressing Cybersecurity in Water and Wastewater Control Systems...
November 24, 2011 Added by:Headlines
ICS-CERT and the FBI found no evidence of a cyber intrusion... In addition, there is no evidence to support claims made in the initial Illinois STIC report... that any credentials were stolen, or that the vendor was involved in any malicious activity that led to a pump failure...
November 23, 2011 Added by:Headlines
While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...
November 22, 2011 Added by:Headlines
ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events... any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available...
November 21, 2011 Added by:Chris Blask
Monitoring of water treatment networks using common SIEM or log management tools offers the kind of capability that can address the need for visibility into control system behavior. The ICS networks found in water facilities are deterministic systems with highly predictable behavior...
November 20, 2011 Added by:Scot Terban
Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...
November 18, 2011 Added by:Headlines
"No damage was done to any of the machinery; I don't really like mindless vandalism. It's stupid and silly. On the other hand, so is connecting interfaces to your SCADA machinery to the internet... This required almost no skill and could be reproduced by a two year old..."
November 18, 2011 Added by:Robert M. Lee
Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013