Since the original AURORA test bed at Idaho Labs in 2007 much has been said about the merits of the test conducted and many conjectures concerning its validity have been made. It is important to remember that AURORA is not an isolated case that exists outside the cybersecurity framework. To...
Qatar-based liquefied natural gas (LNG) producer RasGas reported in early September that malware shut down part of its computer system. This was the latest cybersecurity attack in the Middle East region after the attack on the computer network of a state owned oil producer in Saudi Arabia.
Building the Next System Capable of Fending Off the Next Stuxnet Attack on Industrial Control Systems
Russian antivirus firm Kaspersky Lab seeks a developer and analyst to create an operating system that could dissuade the next Stuxnet attack on industrial control systems. Currently, Kaspersky Lab wants to hire professionals with experience in programming PCS and Supervisory Control And Data Acquisition (SCADA) systems, implementing industrial networking and...
Seems SCADA systems (or at least alleged attacks on them) have hit the big time.Wired magazine is running this story on the Illinois Water Attack.See my post over on Unfettered about what's looking more and more like an Attack by the Keystone Cops instead, wh
My blog on the Illinois water hack was directly based on a formal disclosure announcement by the Illinois State Terrorism and Intelligence Center - STIC (Note: My blog did not identify the state involved. That disclosure came from DHS).
Per the WaterISAC portal, the WaterISAC (Information Sharing and Analysis Center) is a community of water sector professionals who share a common purpose: to protect public health and the environment. The WaterISAC provides email notifications about threats and any incidents demanding immediate attention.
Last week, a disclosure was made about a public water district SCADA system hack. There are a number of very important issues in this disclosure:
There is a perception that control systems, including field devices, have cyber forensic capabilities similar to those of IT systems. That perception is wrong. A control system generally has a Microsoft front-end human-machine interface (HMI) that should have adequate cyber forensics.
Symantec posted on their site the latest information on the next chapter of Stuxnet. The site says that "Duqu" is a new threat whose goal is to gather intelligence in order to conduct a future Stuxnet-like attack.
The final agenda can be found at www.realtimeacs.com There are several unique hallmarks of the conference: