Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

Siemens patches critical SCADA flaws likely exploited in recent attacks

The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them


cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

wateringhole

Industrial software website used in watering hole attack

AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.

How a hacker could cause chaos on city streets

Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.

nuclear bomb test bikini atoll mushroom cloud explosion detonate

Workers at U.S. nuclear regulator fooled by phishers

Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period.

shutterstock 209307634

Buckle up: Security threats to connected cars get real

As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives. It’s a good question.

security checkpoint

Culture clash: How physical security is impacted by cultural norms

Culture, of all things, can affect the strength of physical perimeter security, for better or for worse. We offer a look at what is and isn't working overseas, and why

How to use a cyber war exercise to improve your security program

3 lessons learned by the participants of a recent cyber war strategic exercise that offer insights into a pathway for improvement for everyone

University researchers test cyber-defense for nation's power grid

University researchers are testing whether a distributed computing system could be used to prevent a major blackout during a cyberattack on the nation's power grid.

Major security flaws threaten satellite communications

An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications.

Focus cyber risk on critical infrastructure: Remote substations are vulnerable

Doug DePeppe has some especially strong feelings about protecting remote substations from cyber attacks. Here is his guest CSO blog to explain why.

San Luis Ray – Emergency Response Plan – Utica College Master’s in CyberSecurity

Psychological damage would result from financial uncertainty or if the attack were launched on another sector in the critical infrastructure such as the electric grid, then psychological effects would be caused by a loss of confidence...

Energy sector a prime target for cyber attacks

Experts say the nation's critical infrastructure remains woefully vulnerable

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

House bill favors private-government cooperation over regulation

National Cybersecurity and Critical Infrastructure Protection Act of 2013 to support country's major infrastructure sectors

National Critical Intelligence Estimate - North Korea - Utica College

The latest from Utica College's series of National Critical Intelligence Estimates - North Korea

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

Experts disagree with ICS-CERT, find issue to be severe

Load More