from the department of "ready or not...BOHICA!"

Feb. 6, 2007
Bryan Singer, Chair of SP99, and a SCADA and process security expert in his day job, posted the following on the SCADA email discussion list yesterday: Beware of the enemy at the watercooler...(hopefully this isn't a repeat) Article Text (excerpt) -------------- Beware the 'pod slurping' employee A U.S. security expert who devised an application that can fill an iPod with business-critical da...
Bryan Singer, Chair of SP99, and a SCADA and process security expert in his day job, posted the following on the SCADA email discussion list yesterday: Beware of the enemy at the watercooler...(hopefully this isn't a repeat) Article Text (excerpt) -------------- Beware the 'pod slurping' employee A U.S. security expert who devised an application that can fill an iPod with business-critical data in a matter of minutes is urging companies to address the very real threat of data theft. Abe Usher, a 10-year veteran of the security industry, created an application that runs on an iPod and can search corporate networks for files likely to contain business-critical data. At a rate of about 100MB every couple minutes, it can scan and download the files onto the portable storage units in a process dubbed "pod slurping." To the naked eye, somebody doing this would look like any other employee listening to their iPod at their desk. Alternatively, the person stealing data need not even have access to a keyboard but can simply plug into a USB port on any active machine. . . . Additionally: Some other interesting USB hacks include the Switchblade and Hacksaw featured at hak5.org....taking advantage of U3 technology that allows USB thumb drives to be mounted as CD-ROM's

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.