“The sad truth is that Shodan is just scratching the surface of unprotected or misconfigured SCADA devices… And, of course, the search engine merely finds systems. It doesn’t expose the myriad of bad ...
The ease with which TCP/IP enables one to connect networks has been a huge boon for the power generation industry. Far-flung operations can be hooked up to the network and controlled remotely. And ...
Many leading industrial and governmental network infrastructures employ supervisory control and data acquisition (SCADA) and distributed control systems (DCS) to automate, monitor and control crucial ...
The U.S. currently faces a growing threat from cyber-attacks against its critical infrastructure (CI) vital to our modern society. Many understand this growing threat but don’t know the origins of a ...
Recently I was conducting some research on critical infrastructure security for the next version of my book, the Cyber Commander’s eHandbook. During that work, I repeatedly encountered a particular ...
Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even ...
The warning came in the form of an ICS-CERT Alert, published on October 28. The group, which is part of US-CERT, warns that “multiple independent security researchers” have reported using SHODAN to ...
In this sixth article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and ...
As utilities become more interconnected, and increasingly reliant on remote communications capabilities including automated metering, their elderly supervisory control and data acquisition (SCADA) ...
ReVuln, a Malta-based security startup that specializes in vulnerability research, is working on a product that could allow companies to protect their SCADA (supervisory control and data acquisition) ...
Our critical infrastructure is an attractive target for enemy nations, terrorist groups, or even run-of-the-mill cyber criminals, and many security experts believe that it is not remotely protected ...
Hackers are using the Shodan computer search engine to find Internet-facing SCADA systems using potentially insecure mechanisms for authentication and authorization, according to a warning from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results