Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

energy usage
power lines electric grid

power grid electrical

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.

ted koppel 2008

Ted Koppel’s new book tells a good story but lacks facts

In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section.

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

ted koppel
Q&A

Ted Koppel discusses the inevitable cyberattack on U.S. infrastructure

Ted Koppel, author of "Lights Out" speaks to CSO about the risks of a catastrophic cyberattack on U.S. infrastructure, and how government has no apparent plan to deal with the results.

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

Bringing IT and OT together

In another life I spent just shy of nine years in the ICS space. I worked on the IT security side of the house and helped to shore up defenses. One of the troublesome aspects of this role was the disconnect between IT and OT, or...

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

chemica plant

Kaspersky: ‘A very bad incident’ awaits critical infrastructure

Cyber attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of...

power fingerprint

How ‘Power fingerprint’ could improve security for ICS/SCADA systems

Every digital device or system has a power fingerprint. A new company says monitoring that fingerprint in ICS/SCADA systems can detect intrusions or malfunctions in real time. But some experts say that while it will improve security,...

tehran night

Cylance unveils details of Iran-based hacking in ‘Operation Cleaver’ report

Cylance issued a report titled ‘Operation Cleaver’ that details attacks by Iran-based hackers against high-profile sites including the critical infrastructure of the United States.

Siemens patches critical SCADA flaws likely exploited in recent attacks

The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them

Threat Intelligence firm mistakes research for nation-state attack

A Bloomberg story, backed by data collected by threat intelligence firm, ThreatStream, mistakenly identified scans by a security researcher as a nation-state attack. According to the data, Chattanooga, TN is second only to Beijing in...

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

wateringhole

Industrial software website used in watering hole attack

AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.

Load More