Friday, June 27, 2014

Cyber Security: Medtronic reveals they were targeted by hackers, lost patient records

The largest stand-alone medical device manufacturer in the world has revealed that hackers had successfully infiltrated its computers, and that it had lost some patient records in separate incidents last year. Click here to read the article.

Thursday, June 26, 2014

Cyber Security: Cyber attack on oil firms ‘could cost billions’

A cyber attack on the offshore industry could cost oil and gas firms billions of pounds in lost revenue, an expert warned. And security experts claim that a computer-based attack by hackers, activists or even hostile nations on North Sea oil and gas production is now just a matter of time. Read the article here.

Wednesday, June 25, 2014

Cyber Security: Threats of cyber attacks just as serious as sabotage seen at power plant

Arizona utilities are taking security threats seriously in the wake of sabotage at a Nogales, Ariz., natural-gas plant, but the threat of cyber attacks seems to be drawing more concern than physical threats. Read more about it here.

Tuesday, June 24, 2014

Cyber Security: Hackers Warn Of Cyber Attacks On Oil Companies In Saudi, UAE, Qatar

A Middle East-based group of hackers has issued a threat warning of cyber attacks against Crude Oil, Nat Gas and Energy companies in the Middle East, security firm Symantec reported Thursday.
The threat, made by Anonymous, a politically motivated group of hacktivists, states that they are planning to attack before, during, and after 20 June 2014. Click here to read more.

Monday, June 23, 2014

Cyber Security: Anonymous hacker free after helping disrupt 300 attacks

A former hacker who helped to disrupt at least 300 cyber attacks after agreeing to become an FBI co-operator was given a greatly reduced sentence and allowed to walk free from a US court. Read the article here.


Cyber Security: ICS-CERT Vulnerability Summary for Week of June 16

Click the link below to view the summary of cyber security vulnerabilities for the week of June 16 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB14-174



Friday, June 20, 2014

Cyber Security: Google's Famous Security Guru Found An Embarrassing Hole In Microsoft's Products

On Tuesday, Microsoft warned that it was issuing an emergency patch to fix a dangerous flaw in its software. This is notable for a few reasons. Microsoft rarely releases these kinds of urgent patches, only nine of them so far in 2014. It normally saves all patches for one mega patch day once a month. Click here to read the article.


Thursday, June 19, 2014

Cyber Security: Anonymous plans global cyber attacks on energy firms on Friday

AnonGhost, a politically motivated group of hacktivists, is planning to launch cyber attacks on energy companies globally, including Adnoc and Enoc in the UAE, on Friday for using the dollar in oil trades. Click here to read more.

Wednesday, June 18, 2014

Cyber Security: New Powerful Banking Malware Called Dyreza Emerges

Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware. Read the article here.

Tuesday, June 17, 2014

Cyber Security: Tips on protecting your online activities

With the revelations from Edward Snowden of widespread spying by the government, many people are more interested in cloaking their online activities. Even if you're not be worried about the government reading your email or getting access to your browsing history, there are plenty of other reasons why you might want financial, legal or health information private and secure, whether from unscrupulous hackers or online marketers. Click here to read about some key technologies you can use to protect your online activities.

Friday, June 13, 2014

Cyber Security: Humans are the weakest link in cyber security, experts say

Organizations are more vulnerable to cyber intrusions now than ever before. As the attacks become more sophisticated, simple security controls are not effective for tackling this growing menace, experts have said. Click here to read the article.

Thursday, June 12, 2014

Cyber Security: U.S. companies seek cyber experts for top jobs, board seats

Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that corporate America is increasingly worried about hacking threats. Read the article here.

Wednesday, June 11, 2014

Cyber Security: Hackers put security tool that finds payment card data into their arsenal

Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals. Read about it here.

Tuesday, June 10, 2014

Cyber Security: The Global Cyber Advisor Newsletter - May 2014 Vol. 32

Welcome to the latest Global Cyber Advisor Newsletter,

Our clients, our organization, and our employees require us to have a solid understanding about cyber security and its effects on industrial environments. I believe that Schneider Electric is in a great position to help our clients as we have one of the most mature industrial cyber security practices along with cyber-enabled products in the world. While our organizations across Schneider change, adapt, and mature, rest assured that our focus is to remain first in the market for our cyber solutions.

Continuously Secure:   We continue to prove to the industry that we stay vigilant and help our customers develop their Cyber Strategies and secure their process environments. We have staff to help our clients on a global basis to assess, design, implement and manage their Cyber posture. We have developed suites of products with complementary consulting, which are unmatched in the industry.   

This month's Consultants Corner contribution covers “Using Security Best Practices” by Principal Consultant/BD lead, Tim Johnson.
                                                                                            
The Critical Infrastructure and Security Practice has the skills and the resources to help our clients no matter what industry. We are structured to help with their entire cyber security program. We have essentially the industry’s largest vendor-based cyber security team that assists our clients secure their entire process environment. We understand that cyber security extends beyond a single system and our valued clients need assistance and advice in how to secure their entire plant infrastructure. Cyber security is so much more than product features, firewalls, and anti-virus software. 
 
If you’ve missed our previous editions, you can find them at this location:   http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx

Click here to open the May 2014 newsletter.




Cyber Security: ICS-CERT Vulnerability Summary for Week of June 2

Click the link below to view the summary of cyber security vulnerabilities for the week of June 2 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB14-160



Cyber Security: How to fight back against 'ransomware'

As the name suggests, "ransomware" is a malicious attempt to hold a computer or smartphone hostage - or rather, the data that resides on it. Read this article for tips on how to protect yourself.

Monday, June 9, 2014

Cyber Security: Computer hacker hits electronic road signs in NC

The Department of Transportation says five electronic signs that warn motorists of traffic hazards were hacked late last month. Read the article here.

Friday, June 6, 2014

Cyber Security: Public-private survey finds cybercrime rising, companies and government ill prepared

The hackers are winning, according to a survey of 500 executives of U.S. businesses, law enforcement services and government agencies released last week. Click here to read the results.

Thursday, June 5, 2014

Cyber Security: Your car is a giant computer - and it can be hacked

Imagine driving down the highway at 70 miles per hour, when suddenly the wheel turns hard right. You crash. And it was because someone hacked your car. Click here to read the article.


Wednesday, June 4, 2014

Cyber Security: US Targets European Bank Hackers in Mass Theft

A Russian computer hacker is accused of leading a worldwide conspiracy that targeted hundreds of thousands of computers with malware that enabled his group to steal more than $100 million from business and other bank accounts. Read the article here.