Until recently, almost all of the hacking demonstrations were performed by the national laboratories implicitly indicating that vulnerabilities took a "rocket scientist" to understand and demonstrate. Lately, there have been a number of control system hacking demonstrations from commercial/vulnerability researchers. At the ACS Conference on the 20th, we will have a vulnerability researcher hack AMI infrastructure. We will also have an end-user demonstrate how easy it is to create a broadcast storm affecting legacy field control equipment which has ALREADY shutdown a nuclear plant and a number of process facilities.
Joe Weiss
The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...
Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...
Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...
Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...