searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

ICS/SCADA

Get our top stories in your inbox

Researchers demonstrate tragic state of SCADA security

January 23, 2012

Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …

Secure field area networks for industrial applications

January 19, 2012

Tropos Networks announced the Tropos 1410 wireless mesh router and wireless bridge for field automation applications. Tropos 1410 wireless mesh routers and wireless bridges …

SCADA and PLC vulnerabilities in correctional facilities

December 28, 2011

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

DHS says water pump destruction was not due to SCADA hack

November 23, 2011

“After detailed analysis, DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system of the Curran-Gardner Public Water District in Springfield, …

Another U.S. SCADA system compromised thanks to lousy security

November 21, 2011

After the news about a water utility company in Springfield, Illinois suffering a hack attack that ended in the destruction of a water pump broke on Friday, the U.S. …

Hackers destroy pump in U.S. water utility attack

November 18, 2011

Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and …

Posts navigation

1 … 16 17 18 19 20

Featured news

  • Malicious ads creep into Bing Chat responses
  • How should organizations navigate the risks and opportunities of AI?
  • Why California’s Delete Act matters for the whole country
Guide: SaaS Offboarding Checklist

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

Malicious ads creep into Bing Chat responses

How should organizations navigate the risks and opportunities of AI?

Why California’s Delete Act matters for the whole country

Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)

How to avoid the 4 main pitfalls of cloud identity management

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us