SCADA

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Thousands of Vulnerabilities in NOAA Satellite System

August 27, 2014 Added by:Dan Dieterle

According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 2 of 2)

August 21, 2014 Added by:Identropy

An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

NERC CIPS and Keeping Lights On – Are They the Same?

August 21, 2014 Added by:Joe Weiss

August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Save $300 on ICS Cyber Security Conference Registration

August 21, 2014 Added by:Mike Lennon

Attendees who register by Friday, August 22 will Save $300 and pay just $1695 for a full conference registration which includes 4 days and pre-conference workshops.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Vulnerability Management: Just Turn It Off! PART III

August 20, 2014 Added by:Tripwire Inc

In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

‘BadUSB’ Malware Leaves Terrible Taste at Black Hat 2014

August 19, 2014 Added by:Patrick Oliver Graf

If awards were given out at Black Hat 2014, one nominee for “Exploit of the Conference” would have won in a runaway – the “BadUSB” exploit.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

It’s Time for Retailers to Tell Point-of-Sale Hackers to ‘Back Off’

August 14, 2014 Added by:Patrick Oliver Graf

It’s Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security’s warning that they could, once again, be exploited by malicious actors.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Real Cost of Control System Cyber Security – And it isn’t Cheap

August 13, 2014 Added by:Joe Weiss

There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the 'benefits'.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Google Boosts Secure Sites in Search Results

August 11, 2014 Added by:Electronic Frontier Foundation

In a bold and welcome move to protect users, Google announced on Wednesday that they have started prioritizing sites offering HTTPS (HTTP over TLS) in their page ranking algorithm.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Poor Communication Leads to Defeat on the Network Security Battlefield

August 11, 2014 Added by:Patrick Oliver Graf

During wartime, information can create just as much of an advantage for one side as the size of an army or the weapons they hold. That is, as long as this information is accurate, passed along to the right people and then acted upon quickly.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

“Stop The Pain” Thinking vs the Use Case Thinking

August 07, 2014 Added by:Anton Chuvakin

As I’ve written many times, SIEM is a “force multiplier”, but this definition implies that you have something to multiply. If you have 0 capabilities, a purchase of a SIEM tool will still leave you at – you guessed it!—0.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Another Washington Think Tank Paper on Critical Infrastructure - Another Miss

August 07, 2014 Added by:Joe Weiss

As with the other papers, the paper chairs reflect the upper strata in political Washington. Unfortunately, like the other papers, there is a lack of control system expertise that has been applied even though I was told more than 200 people worked on the paper.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Retail POS System Compromised Through Video Security System

August 06, 2014 Added by:Dan Dieterle

Recently I was talking with a Retail Point of Sale (POS) software expert and was told how a POS system was hacked by an attacker that had gained access to the network through a video security system.

Comments  (0)

B146ded37e4d5e29224d7d0f33a0dc5e

The Science Behind DDoS Extortion

August 04, 2014 Added by:Dan Holden

Well-known names such as Evernote and Feedly have all fallen victim to extortion attacks, but these companies are just the tip of the iceberg when it comes to this very lucrative criminal activity.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »