Critical Infrastructure News, Articles and Updates
International Atomic Energy Agency's (IAEA) director Yukiya Amano said there was a successful cyberattack of a nuclear power plant two to three years ago.
Eugene Kaspersky, CEO of Kaspersky Lab speaks at IP EXPO Europe 2016 and explains why he believes cyber-attackers are now turning their attention to critical national infrastructure.
ISC released an update Tuesday for a high-severity security flaw affecting open source software that implements DNS protocols.
Nearly three-quarters of businesses have end-of-support devices operating in their networks, and the consequences could prove dire, a new study found.
An association of state officials has published an open letter that seeks to strengthen public confidence in the electoral process, in light of research that has raised questions about the security of voting machines.
While it might not include the Death Star cyber warfare among the stars is almost inevitable.
The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.
A Tripwire survey found IT staffers in the energy sector frequently don't have the data needed to see if their assumptions on how their security apparatus function are correct.
Hinkley Point C nuclear power station to go ahead with Chinese involvement despite previous concernsSeptember 16, 2016
Despite concerns over security from both the Prime Minister and one of her chiefs of staff, Hinkley Point C nuclear power station has been given a green light today for construction with backing from China.
A few as 200,000 mobile bots would be enough to launch a successful DDoS attack against the U.S.' 911 infrastructure, significantly disrupting service nationwide, a new research paper from Ben-Gurion University reports.
The Department of Defense does not have the necessary visibility into the cyber capabilities of the National Guard, according to a report by the GAO.
The FBI said foreign hackers made their way into voter databases in two states in recent weeks, the latest indication of potential problems to come in November's presidential election.
Updated! As it considers classifying the electoral system as critical infrastructure, the U.S. government has pledged to provide states with federal assistance to help manage voting cyber risks and taking additional steps to quell fears the election this fall could be hacked.
Updated! Iran's Supreme National Cyberspace Council is investigating whether a recent string of oil and petrochemical fires were caused by a cyberattack.
A recent SecurityScorecard study claims America's financial industry is highly susceptible to data breaches, and legacy systems may be to blame.
Acknowledging a shortfall in the pool of cybersecurity talent needed to combat today's increasingly sophisticated cyberattacks, the federal government announced it is actively expanding recruitment.
A report released today by the Institute for Critical Infrastructure Technology warns that China's latest five-year plan is reliant upon the digital theft of Western nations' intellectual property, despite a 2015 Sino-U.S. pact to eliminate cyberattacks against corporate assets.
In the documentary-thriller Zero Days, an anonymous source not only acknowledges that the U.S. and Israel were behind the Stuxnet cyberattack on Iran's Natanz nuclear facility, but also blames Israel for the worm's eventual discovery.
Disconnecting computers used in power plants and electrical grids from the internet is being proposed in a bill before the Senate.
Shades of Stuxnet: Newly found malware can sabotage industrial controls, but only in simulated environmentsJune 06, 2016
FireEye yesterday revealed details of a recently discovered malware, dubbed Irongate, whose properties echo the infamous StuxNet virus, in that it is theoretically designed to manipulate industrial control systems.
Communicating with the C-suite depends in part of creating a language they understand and identifying company assets that are most important, panelists told an SC Congress Toronto audience.
Five weeks after its official launch, the Canadian Cyber Threat Exchange is already close to selecting an MSP that will manage the group's new cyberthreat intelligence sharing forum, according to a panel session at SC Congress Toronto on Wednesday.
Security and risk are often mentioned in the same breath, and while they can complement each other, taking a risk-based approach is essential to building a realistic and manageable IT security program.
Atlanta has an ambitious plan to bolster its cybersecurity posture.
The DHS yesterday issued its first-ever US-CERT security alert pertaining to the active exploit of an SAP application, after a security vendor determined 36 organizations were infiltrated via an SAP vulnerability that was disclosed over five years ago.
Tampa International Airport has expedited and expanded an audit of its network security, following the resignation of an IT consultant who was allegedly found to have shared system passwords with unauthorized parties.
A defense authorization bill could split off the U.S. Cyber Command from under the direction of U.S. Strategic Command and the NSA.
The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.
The FBI and DHS has scheduled a series of unclassified webinars and threat briefings across the U.S. addressing the 2015 cyberattack against Ukraine's power grid.
The DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, has issued security advisories on vulnerabilities in ICS technologies from Eaton Lighting Systems, Pro-face and Rockwell Automation.