Blog Posts Tagged with "ICS"


DHS Officials Deny Hack of Illinois Water Systems

November 23, 2011 Added by:Headlines

While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...

Comments  (2)


ICS-CERT and FBI Statements on Water System Attacks

November 22, 2011 Added by:Headlines

ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events... any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available...

Comments  (0)


ICS Cybersecurity: Water, Water Everywhere

November 21, 2011 Added by:Chris Blask

Monitoring of water treatment networks using common SIEM or log management tools offers the kind of capability that can address the need for visibility into control system behavior. The ICS networks found in water facilities are deterministic systems with highly predictable behavior...

Comments  (4)


Getting Smacked in the Face Over TCP

November 21, 2011 Added by:Robin Jackson

Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...

Comments  (0)


The FUD Files: Cyber Attacks on Our Water Systems

November 20, 2011 Added by:Infosec Island Admin

Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...

Comments  (1)


South Houston's Water Supply Network Hacked

November 18, 2011 Added by:Headlines

"No damage was done to any of the machinery; I don't really like mindless vandalism. It's stupid and silly. On the other hand, so is connecting interfaces to your SCADA machinery to the internet... This required almost no skill and could be reproduced by a two year old..."

Comments  (0)


US Water System Hacked: A Community-Wide Issue

November 18, 2011 Added by:Robert M. Lee

Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...

Comments  (3)


Are Web Services a Dumb Idea?

November 16, 2011 Added by:Joel Langill

First, you need to expand your concept of an “embedded web server” beyond something that a user would use when launching a browser and entering a URL for the device. Vendors actually use embedded web servers for a number of reasons, and many of these vendors are leaders in the industry...

Comments  (0)


Utility Cyber Security is in a State of Near Chaos

November 16, 2011 Added by:Headlines

"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."

Comments  (0)


Thoughts on the Ohio SCADA Security Symposium

November 15, 2011 Added by:Brent Huston

One of the largest identified issues among the conversations at the symposium was the idea that cooperation and coordination between control network operators and engineers and their peers on the traditional business-oriented IT staff is difficult, if not nearly impossible...

Comments  (0)


Stuxnet II Found in the Wild - Dubbed “Duqu”

October 19, 2011 Added by:Headlines

“Duqu’s purpose is to gather intelligence data and assets from entities such as industrial control system manufacturers in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents..."

Comments  (1)


Security Investment to Focus on Utility Control Systems

October 18, 2011 Added by:Headlines

“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."

Comments  (0)


Flying Blind in Critical Infrastructure

June 07, 2011 Added by:Chris Blask

Once you get your head around the idea that you cannot trust your cyber devices you find it fits with existing industrial ideology quite well. The answer is to do your best to build a reliable cyber system - just as you do with the physical assets - then monitor it like a convicted criminal...

Comments  (2)


Security Experts Launch Cybersecurity Index Resource

May 10, 2011 Added by:Headlines

The Index of Cyber Security is a measure of the risk to the corporate, industrial, and governmental information infrastructure. It is sentiment-based in recognition of the rapid change in cybersecurity threats and the state of cybersecurity metrics as a practical art...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »