Hackers are constantly taking advantage of Java vulnerabilities, most recently using a "drive by download" to secretly install malicious software on users' computers. Read this article for tips on how to limit your risk with Java vulnerabilities.
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Wednesday, July 31, 2013
Tuesday, July 30, 2013
Cyber Security: Hackers can take over cars and drive them using Nintendo controllers
Read about remote control car hacks and how a pair of security experts was able to take control of a
Ford Escape and Toyota Prius using "a laptop, some software, and an old Nintendo Entertainment System gamepad."
Ford Escape and Toyota Prius using "a laptop, some software, and an old Nintendo Entertainment System gamepad."
Monday, July 29, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of July 22
Click the link below to view the summary of cyber security vulnerabilities for the week of July 22 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-210
http://www.us-cert.gov/ncas/bulletins/SB13-210
Thursday, July 25, 2013
Cyber Security: 750 million SIM cards have programming flaws
According to this article, "up to 750 million mobile phones around the world carry SIM cards that contain a programming flaw that could leave their owners vulnerable to fraud. The bug allows a hacker to remotely access personal data and authorise illegal transactions within minutes."
Click here to read the story.
Click here to read the story.
Wednesday, July 24, 2013
Cyber Security: Google glass vulnerable to WiFi hackers
Symantec warns that Google Glass still has vulnerabilities related to WiFi highjacking. Symantec says that "wearable devices by their nature can open up new attack vectors because the user interacts with them differently." Read the details here.
Tuesday, July 23, 2013
Cyber Security: Apple hacked
"Down for maintenance" since last Thursday, Apple admits it was hacked and personal details were accessed. Read the full story here.
Monday, July 22, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of July 15
Click the link below to view the summary of cyber security vulnerabilities for the week of July 15 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-203
http://www.us-cert.gov/ncas/bulletins/SB13-203
Thursday, July 18, 2013
Cyber Security: Clickjacking
Pop-up windows that look like Adobe Flash Player technology have been spreading through social media websites such as Twitter and Facebook. Once users download the fake software, schemers take control of the user's profile. Read the article here for more information and what to do if it happens to you.
Wednesday, July 17, 2013
Cyber Security: White-hat hackers tap into cell phones to expose security flaws
Read about how a group of ordinary white-hat hackers tapped into Verizon cell phones in an effort to warn wireless carriers about security flaws.
Tuesday, July 16, 2013
Cyber Security: Hackers spread malware via Wordpress and Dropbox
"The Chinese cyberspies behind the widely publicized espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks." Click here to read the article.
Monday, July 15, 2013
Cyber Security: April-June 2013 ICS-CERT Monthly Monitor
View ICS-CERT's April-June 2013 newsletter, with a feature article on brute force attacks on internet-facing control systems.
http://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monitor_April-June2013_3.pdf
http://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monitor_April-June2013_3.pdf
Cyber Security: ICS-CERT Vulnerability Summary for Week of July 8
Click the link below to view the summary of cyber security vulnerabilities for the week of July 8 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-196
http://www.us-cert.gov/ncas/bulletins/SB13-196
Thursday, July 11, 2013
Cyber Security: Fruit-themed hack hits Instagram
If you're one of 130 million users on Instagram, beware of spammers "taking over accounts and sending out pictures of fruit that has text directing people to a Bit.ly hyperlink." Users who click the link are taken to a fake BBC page promoting a weight-loss coffee drink. Read the article here.
Wednesday, July 10, 2013
Cyber Security: How to increase your online privacy
With the surge in online storage use and new ways to track user activity such as reading text messages in real time, how secure can we really be? Read this article for advice on how to increase your privacy online.
Tuesday, July 9, 2013
Cyber Security: Foxboro and Triconex Global Client Conference September 10-13 in San Antonio, TX
Foxboro and Triconex Client Conference
San Antonio Marriot Rivercenter, TX
September 10-13, 2013
As a Foxboro and Triconex user, your plant is future-proofed. This year's conference is all about helping you get the most out of your existing assets, people and processes with an eye towards tomorrow. You'll have the opportunity to learn from a strong heritage of control and safety technologists; collaborate with industry experts on current challenges and user proven solutions and experience innovative technology designed to continuously evolve your plant and your business into the future.
Don’t miss keynote speaker Richard A. Clarke, internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. He is currently an on-air consultant for ABC News and teaches at Harvard's Kennedy School of Government.
Register Today!
Cyber Security: ICS-CERT Vulnerability Summary for Week of July 1
Click the link below to view the summary of cyber security vulnerabilities for the week of July 1 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-189
http://www.us-cert.gov/ncas/bulletins/SB13-189
Cyber Security: Cyber attacks on the rise
Targeted attacks on businesses jumped 42 percent last year. Protect yourself from cyber attacks--check your bank statements, report fraud fast, and guard your credit cards well. Click here for more information on credit card fraud and what retailers are required to do to help prevent it.
Wednesday, July 3, 2013
Cyber Security: Password fatigue leads major companies to consider password alternatives
Of 24 nations surveyed, 40 percent of internet users don't bother with complex passwords or fail to regularly change their passwords. Several companies are working on password alternatives, such as the Yubikey, fingerprint readers, and facial recognition software. Read the article here.
Tuesday, July 2, 2013
Cyber Security: Beware of free Wi-Fi
A high school student studying cyber security shows a reporter how easy it is to hack into public Wi-Fi networks and steal user information like credit card numbers. Read the full story here.
Monday, July 1, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of June 24
Click the link below to view the summary of cyber security vulnerabilities for the week of June 24 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-182
http://www.us-cert.gov/ncas/bulletins/SB13-182
Subscribe to:
Posts (Atom)