Critical Infrastructure News, Articles and Updates
An association of state officials has published an open letter that seeks to strengthen public confidence in the electoral process, in light of research that has raised questions about the security of voting machines.
While it might not include the Death Star cyber warfare among the stars is almost inevitable.
The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.
A Tripwire survey found IT staffers in the energy sector frequently don't have the data needed to see if their assumptions on how their security apparatus function are correct.
Hinkley Point C nuclear power station to go ahead with Chinese involvement despite previous concernsSeptember 16, 2016
Despite concerns over security from both the Prime Minister and one of her chiefs of staff, Hinkley Point C nuclear power station has been given a green light today for construction with backing from China.
A few as 200,000 mobile bots would be enough to launch a successful DDoS attack against the U.S.' 911 infrastructure, significantly disrupting service nationwide, a new research paper from Ben-Gurion University reports.
The Department of Defense does not have the necessary visibility into the cyber capabilities of the National Guard, according to a report by the GAO.
The FBI said foreign hackers made their way into voter databases in two states in recent weeks, the latest indication of potential problems to come in November's presidential election.
Updated! As it considers classifying the electoral system as critical infrastructure, the U.S. government has pledged to provide states with federal assistance to help manage voting cyber risks and taking additional steps to quell fears the election this fall could be hacked.
Updated! Iran's Supreme National Cyberspace Council is investigating whether a recent string of oil and petrochemical fires were caused by a cyberattack.
A recent SecurityScorecard study claims America's financial industry is highly susceptible to data breaches, and legacy systems may be to blame.
Acknowledging a shortfall in the pool of cybersecurity talent needed to combat today's increasingly sophisticated cyberattacks, the federal government announced it is actively expanding recruitment.
A report released today by the Institute for Critical Infrastructure Technology warns that China's latest five-year plan is reliant upon the digital theft of Western nations' intellectual property, despite a 2015 Sino-U.S. pact to eliminate cyberattacks against corporate assets.
In the documentary-thriller Zero Days, an anonymous source not only acknowledges that the U.S. and Israel were behind the Stuxnet cyberattack on Iran's Natanz nuclear facility, but also blames Israel for the worm's eventual discovery.
Disconnecting computers used in power plants and electrical grids from the internet is being proposed in a bill before the Senate.
Shades of Stuxnet: Newly found malware can sabotage industrial controls, but only in simulated environmentsJune 06, 2016
FireEye yesterday revealed details of a recently discovered malware, dubbed Irongate, whose properties echo the infamous StuxNet virus, in that it is theoretically designed to manipulate industrial control systems.
Communicating with the C-suite depends in part of creating a language they understand and identifying company assets that are most important, panelists told an SC Congress Toronto audience.
Five weeks after its official launch, the Canadian Cyber Threat Exchange is already close to selecting an MSP that will manage the group's new cyberthreat intelligence sharing forum, according to a panel session at SC Congress Toronto on Wednesday.
Security and risk are often mentioned in the same breath, and while they can complement each other, taking a risk-based approach is essential to building a realistic and manageable IT security program.
Atlanta has an ambitious plan to bolster its cybersecurity posture.
The DHS yesterday issued its first-ever US-CERT security alert pertaining to the active exploit of an SAP application, after a security vendor determined 36 organizations were infiltrated via an SAP vulnerability that was disclosed over five years ago.
Tampa International Airport has expedited and expanded an audit of its network security, following the resignation of an IT consultant who was allegedly found to have shared system passwords with unauthorized parties.
A defense authorization bill could split off the U.S. Cyber Command from under the direction of U.S. Strategic Command and the NSA.
The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.
The FBI and DHS has scheduled a series of unclassified webinars and threat briefings across the U.S. addressing the 2015 cyberattack against Ukraine's power grid.
The DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, has issued security advisories on vulnerabilities in ICS technologies from Eaton Lighting Systems, Pro-face and Rockwell Automation.
The same motivation that has for decades convinced cat burglars to sneak in through open windows and pilfer jewels from the dresser drawers of their sleeping victims moves cybercriminals to slither around in cyberspace to steal data: It's valuable. And easy to get to.
The Department of Homeland Security has declared itself officially ready to exchange cybersecurity intelligence with private industries and other organizations using an automated threat-sharing system, under the terms of the Cybersecurity Act of 2015.
U.S. authorities are reportedly preparing to issue an indictment against Iranian hackers believed to have carried out acyber attack against a New York dam.
There used to be a time when large enterprises, in particular, took pride in the idea of managing all their various and sundry IT functions, every backend process, in-house.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- 185M incidents bypassed perimeter defenses - report
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Android.Lockerscreen using pseudorandom passcodes to ensure payouts
- FBI investigating hacked mobile phones of Democratic officials
- 70% of IDTMs want UK gov to do more so young people enter tech field
- 69% of office professionals in the UK hoard data
- 86% of over-55s worldwide think they're safe from cyber-criminals