Tag Archives: SCADA security

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

SCADA, PLC, PLC and automated devices security interviews coming soon…

After being asked ‘Why?’ are these devices are on the web, we have sent a series of questions to industry leading experts…coming soon

Rate this:

Posted in Technology | Tagged , , , , , | Leave a comment

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic and physical security designs, researchers discovered significant vulnerabilities in PLCs used in correctional facilities … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , | Leave a comment

Is America’s Infrastructure Under Attack?

Over the past 10 years I have taught students that SCADA systems that are related to infrastructure or manufacturing should be guarded and off of the web if it could not be protected.   With computer security hitting headlines everyday, … Continue reading

Rate this:

Posted in Computer Security, Computers, Information Technology, Internet, network, Networking, Technology | Tagged , , , , , , , , , , , , | Leave a comment