Items Tagged with "SCADA"
November 16, 2010 Added by:Headlines
More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...
November 15, 2010 Added by:Headlines
Researchers from Symantec have concluded that Stuxnet was designed to interfere with the performance of high-speed electric motors, the types which would be required to operate the gas centrifuges used in the refinement process...
November 12, 2010 Added by:Headlines
Experts have been debating many aspects surrounding the concept of cyber warfare, but most agree that the the ubiquitous nature of information technology creates an atmosphere where both offensive and defensive methods will likely be factors in international conflicts...
November 11, 2010 Added by:Guy Huntington
My point is that smart grid is like an iceberg. What you see on the surface - energy reduction software to the customer and creating a swift self-healing grid - come below the surface with a large, unseen, infrastructure, personnel and departmental reorganization requirements...
November 04, 2010 Added by:Danny Lieberman
The target is not the SCADA system itself but rather the Siemens WinCC visualization and process monitoring software – WinCC which runs on standard Windows platforms as I pointed out in a previous post, and not on a hardened version of Windows as Shai Blitzblau seems to think...
November 04, 2010 Added by:shawn merdinger
On October 18, a significant event occurred concerning threats to SCADA, the addition of a zero-day exploit for the RealFlex RealWin SCADA software product into the Metasploit repository. This is the first SCADA exploit added to Metasploit. Striking facts about this event follow...
November 03, 2010 Added by:Dan Dieterle
Questions still abound as to who created Stuxnet. Many believe that it was Israel, but now some are saying that it could be China, and the intended target was not an Iranian power plant, but India’s space program...
October 29, 2010 Added by:Guy Huntington
This paper outlines the challenges of deploying smart grid from an identity management and operational perspective. Legislation is forcing utilities to take on home or commercial generated power without thinking through the security, operations and identity implications...
October 28, 2010 Added by:Dan Dieterle
On the Military channel a while back they interviewed a Commando Solo pilot. He mentioned that during Desert Storm, they completely owned Iraq’s communication, radar, SAM and advanced warning systems. They were able to hide American troop movement by removing them from their systems...
October 14, 2010 Added by:Danny Lieberman
The rapid proliferation of Stuxnet into India, Pakistan and Indonesia is indeed an act of purposeful intelligence gathering – following the trail of removable devices and network connectivity used by people from countries collaborating with the Iranian nuclear weapons program...
October 05, 2010 Added by:Pascal Longpre
Operation Aurora, which attacked Google and other Fortune 1000's last year, and the recent Stuxnet worm targeting SCADA systems - nuclear and energy power plants, are here to remind us of the failure of traditional antiviruses to protect systems against targeted high level attacks...
From the Web
October 03, 2010 from: AEON Security Blog
When I first heard about Stuxnet, it made me shrug my shoulders just as much as I shrugged when hearing about Aurora – the “(un)Advanced Persistent Threat.” Outside from all the hype, the entire concept of “Stuxnet” being a “highly weaponized targeted” threat is way out of tune with reality. From everything I have read so far, everyone seems to be repeating what everyone else is repe...
September 27, 2010 Added by:Jamie Adams
NATO spokesman James Appathurai denied that the computers were regularly compromised. However, I didn't hear him dispute the fact that the systems were missing many of the basic security patches. So, is it just a matter of time? Or have the systems already been comprised but NATO is unaware?
From the Web
August 18, 2009 from: Office of Inadequate Security
The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the inf...