Items Tagged with "SCADA"


Legislation to Give DHS Power Over Private Networks

November 19, 2010 Added by:Headlines

Proposed legislation in the House of Representatives would give the Department of Homeland Security new authority to enforce cyber security standards aimed at shoring up private sector computer networks considered critical to national security...

Comments  (0)


Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)


Stuxnet Developed to Halt Iran's Uranium Enrichment

November 15, 2010 Added by:Headlines

Researchers from Symantec have concluded that Stuxnet was designed to interfere with the performance of high-speed electric motors, the types which would be required to operate the gas centrifuges used in the refinement process...

Comments  (0)


UK Minister Advocates Cyber Offensive Capabilities

November 12, 2010 Added by:Headlines

Experts have been debating many aspects surrounding the concept of cyber warfare, but most agree that the the ubiquitous nature of information technology creates an atmosphere where both offensive and defensive methods will likely be factors in international conflicts...

Comments  (0)


Smart Grid and Ops

November 11, 2010 Added by:Guy Huntington

My point is that smart grid is like an iceberg. What you see on the surface - energy reduction software to the customer and creating a swift self-healing grid - come below the surface with a large, unseen, infrastructure, personnel and departmental reorganization requirements...

Comments  (0)


Stuxnet Targeting Specific SCADA Configurations

November 04, 2010 Added by:Danny Lieberman

The target is not the SCADA system itself but rather the Siemens WinCC visualization and process monitoring software – WinCC which runs on standard Windows platforms as I pointed out in a previous post, and not on a hardened version of Windows as Shai Blitzblau seems to think...

Comments  (0)


Metasploit and SCADA Exploits: Dawn of a New Era?

November 04, 2010 Added by:shawn merdinger

On October 18, a significant event occurred concerning threats to SCADA, the addition of a zero-day exploit for the RealFlex RealWin SCADA software product into the Metasploit repository. This is the first SCADA exploit added to Metasploit. Striking facts about this event follow...

Comments  (5)


Stuxnet Could Be Chinese Hit on India's Space Program

November 03, 2010 Added by:Dan Dieterle

Questions still abound as to who created Stuxnet. Many believe that it was Israel, but now some are saying that it could be China, and the intended target was not an Iranian power plant, but India’s space program...

Comments  (0)


Smart Grid Deployment and Identity Management

October 29, 2010 Added by:Guy Huntington

This paper outlines the challenges of deploying smart grid from an identity management and operational perspective. Legislation is forcing utilities to take on home or commercial generated power without thinking through the security, operations and identity implications...

Comments  (0)


Putting the Cyber in Cyber Warfare

October 28, 2010 Added by:Dan Dieterle

On the Military channel a while back they interviewed a Commando Solo pilot. He mentioned that during Desert Storm, they completely owned Iraq’s communication, radar, SAM and advanced warning systems. They were able to hide American troop movement by removing them from their systems...

Comments  (0)


Why Stuxnet Was Developed by the Israelis

October 14, 2010 Added by:Danny Lieberman

The rapid proliferation of Stuxnet into India, Pakistan and Indonesia is indeed an act of purposeful intelligence gathering – following the trail of removable devices and network connectivity used by people from countries collaborating with the Iranian nuclear weapons program...

Comments  (0)


Stuxnet, Aurora: Why AVs Fail and Why We Need Them

October 05, 2010 Added by:Pascal Longpre

Operation Aurora, which attacked Google and other Fortune 1000's last year, and the recent Stuxnet worm targeting SCADA systems - nuclear and energy power plants, are here to remind us of the failure of traditional antiviruses to protect systems against targeted high level attacks...

Comments  (7)

From the Web

Super Nuclear Worm Invades Kazakhstan

October 03, 2010 from: AEON Security Blog

When I first heard about Stuxnet, it made me shrug my shoulders just as much as I shrugged when hearing about Aurora – the “(un)Advanced Persistent Threat.” Outside from all the hype, the entire concept of “Stuxnet” being a “highly weaponized targeted” threat is way out of tune with reality. From everything I have read so far, everyone seems to be repeating what everyone else is repe...

Comments  (2)


Stuxnet Worm Reveals Default Password Vulnerabilities

September 27, 2010 Added by:Jamie Adams

NATO spokesman James Appathurai denied that the computers were regularly compromised. However, I didn't hear him dispute the fact that the systems were missing many of the basic security patches. So, is it just a matter of time? Or have the systems already been comprised but NATO is unaware?

Comments  (22)

From the Web

Audit of Dept of Energy reveals unaddressed problems

August 18, 2009 from: Office of Inadequate Security

The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the inf...

Comments  (1)

Page « < 20 - 21 - 22 - 23 - 24 > »