NIST Cyber Security Framework proposal provides no 'measurable cybersecurity...
Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said
View ArticleGCHQ spooks plotted cyberattacks against telco Belgacom
Last weekend's high-profile cyberattack against telco Belgacom could have been part of a long-running spying campaign by Britain's GCHQ, German magazine Spiegel Online has suggested after studying...
View ArticleSpear phishing poses threat to industrial control systems
Hackers don't need Stuxnet or Flame to turn off a city's lights, say security experts
View ArticleOnline information poses cyber risk for UK critical infrastructure, report...
Data published online by industrial firms could be used to mount a cyber attack against UK critical infrastructure, according to research published by the Institution of Engineering and Technology (IET).
View ArticleThe Internet of Things could encroach on personal privacy
A recent White House report on big data wonders aloud about the capability of sensors and smart meters to turn homes into fish tanks, completely transparent to marketers, police -- and criminals.
View ArticleWhy businesses should use caution with HTML5-based mobile apps
University researchers have found that HTML5-based mobile apps, which are expected to become more prevalent over the next several years, could add security risks for businesses.
View ArticleFeds issue bulletin warning about malicious 'Google dorking' cyber actors
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning...
View ArticleHow 'Power fingerprint' could improve security for ICS/SCADA systems
Most people have heard that one way law enforcement can figure out who might be growing marijuana in their basement is to monitor power consumption.
View ArticleProminent healthcare CIO: FDA medical device security warning "will be the...
Dr. John Halamka has taken to his "Life as a Healthcare CIO" blog to sound the alarm on medical device threats in the wake of the FDA late last week issuing its first cybersecurity warning about a...
View ArticleThe six pillars of Next Generation Endpoint Protection
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
View ArticleCritical infrastructure systems are dangerously exposed to the internet
Security flaws, failure to patch, and the use of insecure protocols are contributing to a growing number of weaknesses in systems used to automate critical infrastructure processes, according to a new...
View ArticleWill ransomware attackers target critical infrastructure next?
Researchers from Georgia Tech have demonstrated that it is possible to ransom a water treatment plant by hacking its control systems.
View ArticleNew Wave of Ransomware Could Put Utilities at Risk
The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure.
View Article'Crashover' malware for power sector can cause black outs
Researchers uncover well-crafted malware that's designed to disrupt core electricity substation equipment to cause outages.
View ArticleCritical remotely exploitable Schneider bug threatens industrial plants
Flaw in industrial software could cripple plant operations, however a patch was released weeks ago.
View Article
More Pages to Explore .....