The Malaysia Airlines website has been commandeered by hackers who referenced Islamic State and claimed to be from the "Lizard Squad", a group known for previous denial-of-service attacks. Read more here.
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Showing posts with label Water Treatment. Show all posts
Showing posts with label Water Treatment. Show all posts
Thursday, January 29, 2015
Monday, January 19, 2015
Cyber Security: ICS-CERT Vulnerability Summary for Week of January 12
Click the link below to view the summary of cyber security vulnerabilities for the week of January 12 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB15-019
https://www.us-cert.gov/ncas/bulletins/SB15-019
Monday, January 12, 2015
Cyber Security: ICS-CERT Vulnerability Summary for Week of January 5
Click the link below to view the summary of cyber security vulnerabilities for the week of January 5 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB15-012
https://www.us-cert.gov/ncas/bulletins/SB15-012
Thursday, January 8, 2015
Cyber Security: Tampa #1 in nation for computer hacker attacks
Tampa is number one in the nation, but not for the reason you might hope. A new study from EnigmaSoftware.com finds this region is the single-most hacked spot in the country when it comes to people's personal computers. Click here to read the article.
Tuesday, December 23, 2014
Cyber Security: 2015 cyber risk and data protection predictions
Businesses in 2015 are expected to experience increasing challenges as
they struggle to contend with the burgeoning threat of complex
cybercrime. EY analysis has outlined some of the key areas that cyber
risks threaten to impact in the coming year, including the difficulties
in the insurance sector of underwriting cyber risk, the raft of
regulation coming out of both the EU and the UK, the importance of
integrated risk functions in firms, and the cyber risk of supply chains
moving to the cloud. Click here to read more.
Monday, December 15, 2014
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 8
Click the link below to view the summary of cyber security vulnerabilities for the week of December 8 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB14-349
https://www.us-cert.gov/ncas/bulletins/SB14-349
Friday, December 12, 2014
Cyber Security: Companies Should Assume Cyber Attackers Are Already Inside
Companies seeking to shield valuable data from criminals and government spying should assume the attackers have already penetrated their systems and adjust defensive strategies, security firms McAfee and Symantec Corp. said. "You must assume something is going on and you have to start looking for it," Patty Hatter, chief information officer and senior vice president of operations at Intel Corp.'s McAfee, said today at the Bloomberg Enterprise Technology Summit in London. Click here to read the full story.
Wednesday, December 10, 2014
Cyber Security: Cyber attacks to worsen in 2015, McAfee researchers say
A series of spectacular cyber attacks drew headlines this year, and the situation will only worsen in 2015 as hackers use more advanced techniques to infiltrate networks, security researchers said yesterday. Click here to read the article.
Friday, December 5, 2014
Cyber Security: A Good Cyber Defense Can Protect Pharmaceutical and Medical Device Companies
The inability to keep data safe can undermine the results of a clinical study and an organization’s ability to generate new products and ensure the safety of existing ones. Much of the world’s critical infrastructure and vital goods are at significant risk of cyber security threats. Add to this discomforting list of threats to medical devices and pharmaceutical manufacturing.
Some companies in different industries underestimate the threat of cyber attacks believing falsely that because their control and monitoring systems are not connected to the Internet, they many not be subject to traditional hacking. “The big theory is that there is no technology connection between us in the plant and others in the outside world so our control systems are safe,” said Doug Clifton, global director, critical infrastructure and security practice at Schneider Electric.
Read the full article here.
Some companies in different industries underestimate the threat of cyber attacks believing falsely that because their control and monitoring systems are not connected to the Internet, they many not be subject to traditional hacking. “The big theory is that there is no technology connection between us in the plant and others in the outside world so our control systems are safe,” said Doug Clifton, global director, critical infrastructure and security practice at Schneider Electric.
Read the full article here.
Tuesday, December 2, 2014
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 24
Click the link below to view the summary of cyber security vulnerabilities for the week of November 24 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB14-335
https://www.us-cert.gov/ncas/bulletins/SB14-335
Cyber Security: Anonymous pledges more attacks in Canada
The Anonymous hacker group that took credit for the cyber attack on Ottawa City Hall has pledged eight more targets in Canada, including Ottawa Police and the Supreme Court. Click here for the full story.
Wednesday, November 19, 2014
Cyber Security: 10 ways to protect your Devices and Data
Gee, it used to be just your desk computer that needed protection from cyber thugs. Now, your connected thermostat, egg tray monitor, teen’s smartphone, garage door opener, even baby monitor, are all game for cyber creeps. Click here to read about 10 ways to help protect your devices and data from hackers.
Monday, November 10, 2014
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 3
Click the link below to view the summary of cyber security vulnerabilities for the week of November 3 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB14-314
https://www.us-cert.gov/ncas/bulletins/SB14-314
Tuesday, November 4, 2014
Cyber Security: Add data breaches to holiday shopping stress
With the holiday shopping season on the horizon, many retailers soon will be dishing out deals and special promotions to get shoppers in the spending spirit. But what consumers seem to really want for Christmas this year is to keep their personal financial information out of the hands of hackers. CreditCards.com, a credit-card comparison website, recently conducted a survey of 865 credit and debit card holders, and 45 percent said they would not shop this holiday season at retail chains that had been affected by major data breaches. Read more here.
Monday, November 3, 2014
Cyber Security: ICS-CERT Vulnerability Summary for Week of October 27
Click the link below to view the summary of cyber security vulnerabilities for the week of October 27 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB14-307
https://www.us-cert.gov/ncas/bulletins/SB14-307
Tuesday, October 28, 2014
Cyber Security: ICS-CERT Vulnerability Summary for Week of October 20
Click the link below to view the summary of cyber security vulnerabilities for the week of October 20 as collected and reported by ICS-CERT.
https://www.us-cert.gov/ncas/bulletins/SB14-300
https://www.us-cert.gov/ncas/bulletins/SB14-300
Wednesday, October 22, 2014
Cyber Security: Oil and Gas Industry Unites to Pull Plug on Cyberintruders
Companies in the U.S. oil and gas industry are moving to work together to fight the onslaught of cyber security marauders infiltrating their computer network systems. Last year, the Department of Homeland Security said it worked on 256 security events involving critical infrastructure; sixty percent involved the energy sector. Read more here.
Monday, October 20, 2014
Cyber Security: May-August 2014 ICS-CERT Monitor
View ICS-CERT's May-August 2014 newsletter, with a feature article on control system anomalies at water treatment facilities.
https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_May-Aug2014.pdf
https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_May-Aug2014.pdf
Friday, October 10, 2014
Cyber Security: The one cybersecurity threat everyone misses
After a spate of high-profile cyber security breaches at major companies like Target and, more recently, Home Depot and JPMorgan Chase, the biggest players for the most part have strong protections to wall off their proprietary information. But smaller vendors who can't afford expensive security measures—and yet have links to some of their larger client's sensitive data—are now in the crosshairs of sophisticated hackers. Read the article here.
Thursday, September 25, 2014
Cyber Security: Massively Distributed Citadel Malware Targets Middle Eastern Petrochemical Organizations
Recently, IBM Trusteer researchers identified targeted cyber attacks on several Middle Eastern petrochemical companies. They have identified a campaign in which attackers are using a variant of the evasive Citadel malware. Citadel was originally created for the purpose of stealing money from banks and has been massively distributed on users’ PCs around the world. Read the article here.
Subscribe to:
Posts (Atom)