Tag Archives: ics/scada

Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These threats have included power grids in Ukraine and Ireland, U.S. energy companies and nuclear power plants, and most recently, at an electric utility on the West Coast where a distributed denial-of-service (DDoS) attack overwhelmed grid network systems with false Web traffic. This was the first documented digital attack … More ? The post Countering industrial cyberthreats with secure, standards-based, licensed wireless networks appeared first on Help Net Security .

Read more here:
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator

Applied Risk ICS Security Consultant Tom Westenberg discovered a DoS vulnerability in an emulated version of the Triconex TriStation Software Suite. Triconex is a Schneider Electric brand which supplies systems and products in regards to critical control and industrial safety-shutdown technology. The Triconex Emulator is software that allows users to emulate and execute TriStation 1131 applications without connecting to a Tricon, Trident, or Tri-GP controller. Using the Emulator, users can test applications in an offline … More ? The post Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator appeared first on Help Net Security .

Link:
Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator

7 Iranians indicted for cyber attacks on US banks and a dam

The US Justice Department unsealed on Thursday an indictment charging seven Iranian computer specialists for conducting a coordinated campaign of distributed denial of service attacks against 46 major companies, primarily in the US financial sector, from late 2011 through mid-2013. The individuals – Ahmad Fathi; Hamid Firoozi; Amin Shokohi; Sadegh Ahmadzadegan, a/k/a Nitr0jen26; Omid Ghaffarinia, a/k/a PLuS; Sina Keissar; and Nader Saedi, a/k/a Turk Server – were employed by two Iran-based computer companies, ITSecTeam and … More ?

View article:
7 Iranians indicted for cyber attacks on US banks and a dam