Hijinks from Defcon..."we will scary you!"

Aug. 6, 2007
Brian Mast reports on the SCADA list: Researcher: Flaw exposes hack threat Staff and agencies 04 August, 2007 By JORDAN ROBERTSON, AP Technology Writer LAS VEGAS - Terrorists and other criminals could exploit a newly discovered software flaw to hijack massive computer systems used to control critical infrastructure like oi...
Brian Mast reports on the SCADA list: Researcher: Flaw exposes hack threat Staff and agencies 04 August, 2007 By JORDAN ROBERTSON, AP Technology Writer LAS VEGAS - Terrorists and other criminals could exploit a newly discovered software flaw to hijack massive computer systems used to control critical infrastructure like oil refineries, power plants and factories, a researcher said Saturday. The software is used to manage supervisory control and data acquisition, or SCADA, systems "” computers that regulate the functioning of such important infrastructure as oil and gas pipelines, water treatment and power transmission facilities and the giant factories used by large technology companies. Read the rest of the article here, for copyright reasons....  As Brian notes, Robertson's article is untutored and intended to scare the pants off us. The problem is that legislators read AP much more than they read Control or the SoundOFF! blog or the SCADA list. This is the kind of soundbite reporting that can and will make legislators foam at the mouth and run around aimlessly, seeking to be seen doing something to protect our infrastructure. Once again, we have the need to speak at the highest levels of our respective governments. So, who's gonna go do it?

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.