Mobile applications used to help control internet-connected SCADA (industrial control and supervisory control and data acquisition) systems are riddled with security vulnerabilities which, if ...
SCADA systems are ever more open to security threats – Amol Sarwate explains how to mitigate the risks All around us, critical IT services keep our homes powered, water coming to the taps, and ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
Threats to aging supervisory control and data acquisition (SCADA) systems, which monitor and control key industrial processes in critical infrastructure, have been growing in recent years. The latest ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
Friend and colleague Professor Michael Miora, CISSP-ISSMP, FBCI has contributed the following interesting case study to the series of columns on the security of supervisory control and data ...
Cyber security hardware / software combination protects industrial networks against USB stick delivered malware like StuxNet. Addressing the industrial network vulnerabilities brought to light by the ...
While the race between industrial control system attackers and defenders didn’t start with the Stuxnet worm, it certainly acted as a catalyst to a new arms race and more researchers taking a closer ...
Like Cliff Claven (the jovial factoid-sharing postal carrier of the syndicated television comedy, "Cheers"), I'm easily enthralled by trivia. For example, I bet you didn't know that Hells Canyon, ...
The first time Scott Lunsford offered to hack into a nuclear power station, he was told it would be impossible. There was no way, the plant's owners claimed, that their critical components could be ...
Don’t expect any of these attacks on SCADA and ICS to slow any time soon. In his talk, “Who’s Really Attacking Your ICS Devices?”, presented recently at Black Hat Europe 2013, Trend Micro Threat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results