Items Tagged with "SCADA"


A966b1b38ca147f3e9a60890030926c9

Paper Frames Debate on Big Brother in Critical Infrastructure

September 08, 2011 Added by:Chris Blask

The three scenarios exercise the legal issues of government access to information of increasing depth. The first two speak to capabilities that should be further developed -honeynets and continuous monitoring - while the third scenario in part touches on workforce development...

Comments  (1)

8b5e0b54dfecaa052afa016cd32b9837

The Growth of Cyber Terror

September 07, 2011 Added by:Craig S Wright

SCADA systems and other critical infrastructure is taken for granted and we forget just how much of our lives are managed through private systems. Exploits have been noted as being of critical concern in US government briefs. We also forget that SCADA systems are connected to the world...

Comments  (15)

A966b1b38ca147f3e9a60890030926c9

The Unfinished State of our National ICS Reporting System

August 23, 2011 Added by:Chris Blask

The rather petulant tone of the advisory indicates problems with the way our system is setup as well as insufficient process and staffing being applied to outbound communications. Certainly, advisories with content and tone like this one are not a step in the right direction...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

August 22, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Correctional Facilities Vulnerable to Stuxnet-Style Attacks

August 09, 2011 Added by:Dan Dieterle

If a prison PLC system could be exploited, prison doors could be opened allowing prisoners to escape or doors could be forced closed creating safety issues. Also, all of the doors could be opened or closed at the same time damaging the control systems with a large influx of current...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

PLC Controlers, Stuxnet, and Kinetic Attacks: Black Hat 2011

August 04, 2011 Added by:Infosec Island Admin

Today we have a hacker community out there able to get their hands on code easily and even perhaps the PLC systems themselves to create even more exploits. Add to this that many SCADA systems have been connected to the Internet (as they should NEVER BE) ripe for attack and we have a big problem...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

On PLC Controllers and Obvious Statements

August 01, 2011 Added by:Infosec Island Admin

Post Stuxnet, this paper and the presentation to follow at DEFCON this year seems more like a call for attention and perhaps a marketing scheme than anything revelatory befitting a talk at DEFCON. Having read the paper, it leaves me nonplussed as to why this s being presented at all...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Iran Still Struggling With Stuxnet Virus Infestation

July 21, 2011 Added by:Headlines

"Tehran never did overcome the disruptions caused by Stuxnet or restore its centrifuges to smooth and normal operation as was claimed. Indeed, Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

A966b1b38ca147f3e9a60890030926c9

Network Security: The Threats You Don’t See

June 22, 2011 Added by:Chris Blask

Threats to critical infrastructure are usually discussed in the terms of Cyber Warfare. Unlike a nation-state, however, there is no reason to believe that a sufficiently motivated individual or small group would not release malware which attacks everything it sees...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Project Cyber Dawn Explored Libyan Vulnerabilities

June 15, 2011 Added by:Headlines

The authors of Cyber Dawn argued that something similar to the Stuxnet attack on Iran could be done in Libya, noting that German engineering conglomerate Siemens AG — whose software system was exploited by Stuxnet — has played an important role in projects across the Libya...

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Siemens Patches SCADA System Vulnerabilities

June 14, 2011 Added by:Headlines

Siemens was prompted to take swift action after security researcher Dillon Beresford cancelled a scheduled presentation at the Takedown Conference in Dallas where he planned to reveal an exploit proof-of-concept aimed at Siemens controllers...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Flying Blind in Critical Infrastructure

June 07, 2011 Added by:Chris Blask

Once you get your head around the idea that you cannot trust your cyber devices you find it fits with existing industrial ideology quite well. The answer is to do your best to build a reliable cyber system - just as you do with the physical assets - then monitor it like a convicted criminal...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

AlienVault Releases SCADA SIEM for Critical Infrastructure

May 31, 2011 Added by:Headlines

"We have a solution that can address the security and compliance needs of customers in process control industries including electric power utilities, public works and oil & gas. You just cannot get that level of capability, reliability and integration with legacy IT or ICS solutions..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

The Marketing Department Fixed Those SCADA Vulnerabilities

May 25, 2011 Added by:J. Oquendo

DHS, Siemens and other similar organizations are naive to think that attackers aren't actively exploiting their software. Regardless if a researcher decided to not publicly speak about an exploit, there is an assumption that it isn't already exploited. How wrong they are....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Homemade Cyber Weapon On Par With Stuxnet Virus

May 25, 2011 Added by:Headlines

"The reaction by Siemens is the old school knee-jerk reaction: 'Just 'cus some kids can do it does not mean we are targeted'. Industrial control vendors and users have to take this very seriously. They are being targeted, they are vulnerable, and the repercussions could be expensive..."

Comments  (0)

Page « < 19 - 20 - 21 - 22 - 23 > »