Blog

Depsite IT, Industrial and Utility Security Still Weak

June 24, 2014

In a comprehensive interview with CNET News, security expert Joe Weiss -- an authority on cybersecurity in the industrial and utilities industries -- discusses the ongoing disconnect between IT security and the world of critical infrastructure. (A subject we've discussed before).

Read More

Researchers Find Ways to Track and Spy on Mobile Phones, Legally

June 24, 2014

A recent article on CNET reports that researchers have found a way to target a person's mobile phone, obtain its number, locate the phone geographically, track the phone's--and its owners--movements, and ultimately listen to the phone's voicemail messages. But the most shocking aspect of this cyber-spy scenario is that it is completely legal, using databases and protocols that are part of the mobile telecommunications system.

Read More

Fraudulent Card Readers Skim Customer Data

June 24, 2014

We've posted before about thieves installing credit card "skimmers" over the card readers at automated gas pumps. And now, a chain of retail stores has been hit with a similar scam, in which thieves swapped out the stores existing POS card readers--the devices customers use to swipe their cards and enter their PIN codes--and replaced them with identical looking card readers that could have stolen the customers' information.

Read More

New Smart Grid Security Document Released

June 24, 2014

We've posted before about the National Institute of Standards and Technology's (NIST) Smart Grid security strategy draft. And now the NIST has announced the second draft of its Smart Grid Cyber Security Strategy and Requirements document, which is currently available for public comment.

Read More

Industrial Control Systems Hit by Malware

June 24, 2014

A new report from the Repository of Industrial Security Incidents (RISI) shows that, over the past five years, the industrial control systems that run utility plants--including power, water, and wastewater--are increasingly subject to security breaches involving malware and viruses. And this is despite only 10 percent of industrial control systems being directly connected to the internet.

Read More
COMMENTS