SCADA

B64e021126c832bb29ec9fa988155eaf

Mana Tutorial: The Intelligent Rogue Wi-Fi Router

October 21, 2014 Added by:Dan Dieterle

Like other rogue Wi-Fi AP programs Mana creates a rogue AP device, but Mana does so much more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Two-Factor Authentication is Too Important to Ignore

October 21, 2014 Added by:Patrick Oliver Graf

Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Lessons from Complex, Dynamic Environments

October 14, 2014 Added by:Rafal Los

Security is hard, folks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Shellshock Leaves Deep Impact on Network Security

October 09, 2014 Added by:Patrick Oliver Graf

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What Is ICS Cybersecurity – You Don't Need Digital Assets

October 08, 2014 Added by:Joe Weiss

I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Unintentional ICS Cyber Incidents Have Had Significant Impacts on Nuclear Plants – Why Aren’t they Being Addressed?

October 02, 2014 Added by:Joe Weiss

The NIST definition of a cyber incident as defined in FIPS PUB 200, Minimum Security Requirements for Federal Information and Information System, is electronic communications between systems or systems and people that impacts Confidentiality, Integrity, and/or Availability. The incident doesn’t have to bemalicious or targeted to be a cyber incident

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Network Security for CIOs: A Marathon or a Sprint?

October 02, 2014 Added by:Patrick Oliver Graf

The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Patch for ShellShock ASAP!

September 30, 2014 Added by:Brent Huston

Source IPs for probes looking for the vulnerability are growing slowly in number and scope of scans. (As of 9/30/14, 10am Eastern).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Bash Bug Could Wreak Havoc on Linux and OS X Systems

September 25, 2014 Added by:Malwarebytes

It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

2014 ICS Cyber Security Conference: Register Today to Hold Your Spot

September 17, 2014 Added by:InfosecIsland News

Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Attendees can register online and pay just $1895 for a full conference registration which includes 4 days AND workshops on Monday.

Comments  (5)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »