Between April and September 2012, the energy business, which includes oil and gas producers, was hit with more targeted malware attacks than any other industry. Click here to read the article.
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Thursday, June 27, 2013
Wednesday, June 26, 2013
Cyber Security: Could terrorists remotely crash your car?
Read about the possibility of remote carjacking as car technology continues to advance. According to AOL Autos, "the National Highway Traffic Safety Administration opened up a 'cyber terrorism department' to sort out software issues that could make cars vulnerable to attack."
Tuesday, June 25, 2013
Cyber Security: Could hackers switch off pacemakers?
The FDA has warned medical device manufacturers of a very real and very possible threat: hackers may be able to remotely switch off pacemakers. Read the article here.
Monday, June 24, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of June 17
Click the link below to view the summary of cyber security vulnerabilities for the week of June 17 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-175
http://www.us-cert.gov/ncas/bulletins/SB13-175
Friday, June 21, 2013
Thursday, June 20, 2013
Cyber Security: Ransomware virus schemes to steal
A new computer virus referred to as "ransomware" has affected consumer PCs in Central Florida, giving users a message claiming that "pornography has been 'detected' on the computer in violation of a litany of federal statutes." The message says users have 72 hours to pay $300-400 in fines or else a hard drive will be sent to the FBI with evidence of pornography. Read the article here.
Wednesday, June 19, 2013
Cyber Security: Foxboro and Triconex Global Client Conference September 10-13 in San Antonio, TX
Foxboro and Triconex Client Conference
San Antonio Marriot Rivercenter, TX
September 10-13, 2013
As a Foxboro and Triconex user, your plant is future-proofed. This year's conference is all about helping you get the most out of your existing assets, people and processes with an eye towards tomorrow. You'll have the opportunity to learn from a strong heritage of control and safety technologists; collaborate with industry experts on current challenges and user proven solutions and experience innovative technology designed to continuously evolve your plant and your business into the future.
Don’t miss keynote speaker Richard A. Clarke - Cyber Security Expert, former Counterterrosrism Czar & best-selling author, and the celebration of Triconex 30 years providing safe, available and secure operations.
Don’t miss out - Register Today!
http://foxboro.com/clientconference
http://triconex.com/clientconference
Cyber Security: British eavesdropping agency GCHQ hacks foreign diplomats' phones
A well-known British eavesdropping agency, GCHQ, has allegedly been hacking into foreign diplomats' phones during international conferences hosted by the U.K., even going as far as bugging a nearby internet café in an attempt "to get an edge in high-stakes negotiation." Click here to read the article.
Tuesday, June 18, 2013
Cyber Security: 5 signs your computer is infected
5 signs your computer is infected: pop-up ads, phantom messages, locked computer, programs and tools stop working, and more commonly, everything appears fine. Read this article for details on what to look for if your computer becomes infected with malware.
Monday, June 17, 2013
Cyber Security: Instances of hackers demanding ransoms grow
Instances of hackers demanding ransoms have grown exponentially over the last several years. In 2011, there were 18 complaints about the Reveton malware, and in 2012, that number had skyrocketed to almost 2,000. Between 2002 and 2013, individuals have claimed as much as $900,000 in losses.
Click here to read the article.
Click here to read the article.
Cyber Security: ICS-CERT Vulnerability Summary for Week of June 10
Click the link below to view the summary of cyber security vulnerabilities for the week of June 10 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-168
http://www.us-cert.gov/ncas/bulletins/SB13-168
Friday, June 14, 2013
Cyber Security: Researchers claim they can hack Apple devices via USB chargers
Two doctoral students and a staff researcher at Tech's College of Computing said they "were able to bypass Apple software security and install 'arbitrary software'" via a USB charger. Click here to read the article.
Thursday, June 13, 2013
Cyber Security: How to avoid being hacked
Click here to read an article containing helpful suggestions to avoid being hacked, especially during travel.
Wednesday, June 12, 2013
Cyber Security: How your smartphone will identify you privately
Your smartphone can identify you, particularly through dictionary attacks (a history of commonly used words you have typed), simple passwords, and password reuse. Find out how you can better protect yourself by reading the article here.
Tuesday, June 11, 2013
Cyber Security: Amish hackers
Even with limited access to technology, the Amish are finding ways to hack electronics--such as kitchen blenders that run on air pressure--to make them fit into their lifestyle. Click here to read what Amish hackers could teach tech-frenzied American consumers.
Monday, June 10, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of June 3
Click the link below to view the summary of cyber security vulnerabilities for the week of June 3 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-161
http://www.us-cert.gov/ncas/bulletins/SB13-161
Friday, June 7, 2013
Cyber Security: Dell tablet winner announced
Thanks to everyone who participated in our blog contest! We appreciate the large number of survey responses and all of your valuable input. As always, at any time, feel free to share your thoughts about our blog topics or provide suggestions for future posts.
Congratulations to the winner of our Dell tablet, Brent H.! We will be in contact with you shortly via email with details.
Thursday, June 6, 2013
Cyber Security: Apple's two-factor authentication leaves holes for hackers
Despite Apple's two-factor authentication process, researchers have found that there are still vulnerabilities that leave user information at risk. The second factor is only required in certain circumstances such as changing account details, seeking support, or making a purchase. "Apple did a half-hearted job," writes Elcomsoft's Vladimir Katalov in the blog post describing the flaws, "Still leaving ways for the intruder to access users’ personal information bypassing the (optionally enabled) two-factor authentication." Click here to read the article.
Wednesday, June 5, 2013
Cyber Security: President Obama to confront China's leader about cyber attacks on U.S.
During the U.S.-China summit on June 7 and 8, President Obama will confront Xi Jinping over a spate of cyber attacks on the US, including the latest allegation that Chinese hackers gained access to more than two dozen of America's most advanced weapons systems. Click here to read the article.
Tuesday, June 4, 2013
Cyber Security: Power companies under a constant state of attack
An Electric Grid Vulnerability report written by the staff of Congressman Edward J. Markey and Henry A. Waxman reveals that power companies feel they are under a constant state of attack, with one power company claiming 10,000 attempted cyber attacks per month. What would you do in a power outage lasting days, weeks, or even months? Click here for the article.
Monday, June 3, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of May 27
Click the link below to view the summary of cyber security vulnerabilities for the week of May 27 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-154
http://www.us-cert.gov/ncas/bulletins/SB13-154
Subscribe to:
Posts (Atom)