InfoSec

SCADA/ Industrial Security

  • newFirst Impression: GAO Report on FAA Security – The Sky is Not Falling

    First Impression: GAO Report on FAA Security – The Sky is Not Falling

    Yesterday, the Government Accountability Office (GAO) released “FAA Needs to Address Weaknesses in Air Traffic Control Systems,” a report that highlights the improvements the Federal Aviation Administration (FAA) needs to make to its critical air…
    - 2 hours ago Tuesday, March 3, 2015 -
  • newIIoT – What’s In A Name

    IIoT – What’s In A Name

    First in a series on IIoT, Industrial Internet and Industrie 4.0. I attended the ARC Forum last month in Orlando, and the theme was what ARC has coined as the Industrial Internet of Things (IIoT). Theme does not accurately describe the emphasis. Ever…
    - 6 hours ago Tuesday, March 3, 2015 -
  • newThe <b>Cybersecurity</b> Framework in Action: An Intel Use Case
    Malcolm was briefing how Intel corporation leveraged the NIST-coordinated Framework for Improving Critical Infrastructure Cybersecurity to create a ...
    - 6 hours ago Tuesday, March 3, 2015 -
  • newWatchdog Calls for DHS Reform to Improve Homeland <b>Security</b>
    The Department of Homeland Security (DHS) plays a critical role in .... cybersecurity issues in several critical infrastructure areas—including in the ...
    - 20 hours ago Monday, March 2, 2015 -
  • newLockheed sees shift in focus on <b>infrastructure cyber security</b>
    1 supplier, said it has seen a "sea change" in demand for cyber security services in critical infrastructure areas such as energy, oil and gas, and ...
    - 22 hours ago Monday, March 2, 2015 -
  • newLockheed sees shift in focus on <b>infrastructure cybersecurity</b>
    1 supplier, said it has seen a "sea change" in demand for cybersecurity services in critical infrastructure areas such as energy, oil and gas, and ...
    - 22 hours ago Monday, March 2, 2015 -
  • newPrivacy & <b>Cybersecurity</b> Update - February 2015 (Updated)
    ... cybersecurity information sharing between the federal government and critical infrastructure,14 and, together with the establishment of the Cyber ...
    - 22 hours ago Monday, March 2, 2015 -
  • newIs the healthcare sector spending too little on <b>cybersecurity</b>?
    ABI Research calculates cybersecurity spending for healthcare protection to only reach $10 billion globally by 2020, or just under 10 percent of total ...
    - 23 hours ago Monday, March 2, 2015 -
  • newDonnelly: Quickly Debate, Pass <b>Cybersecurity</b> Legislation
    We need to address these threats to our critical infrastructure and data security on all fronts. In addition to ensuring we are on the leading edge of ...
    - 23 hours ago Monday, March 2, 2015 -
  • newS4x15 Video: ICS Malware with Kyle Wilhoit

    S4x15 Video: ICS Malware with Kyle Wilhoit

    Kyle Wilhoit has found and analyzed a large portion of the ICS malware found in 2014 / 2015. He goes into the details of: – The Sandworm group looking for Internet exposed HMI and their targets – Blacken / Black Energy targeting the GE Cimplicity…
    - 1 day ago Monday, March 2, 2015 -
  • newRussian Cyber Menace Threatens Industrial Systems

    - 1 day ago Monday, March 2, 2015 -
  • Wall Street Journal CIO Network Event: Old Thinking Won’t Fix New Problems

    Wall Street Journal CIO Network Event: Old Thinking Won’t Fix New Problems

    Earlier this month, the Wall Street Journal published a blog, “CIOs Name Their Top 5 Strategic Priorities,” which collected the recommendations from a variety of technical leaders at a CIO Network event. Author Steven Norton notes: While proposal…
    - 4 days ago Friday, February 27, 2015 -
  • When Zero Days Become Weeks or Months

    When Zero Days Become Weeks or Months

    As February comes to a close we have already seen critical patches from Adobe and Microsoft. Even more concerning, Microsoft has not yet patched a recently disclosed Internet Explorer zero-day. For better or worse, Google’s “Project Zero” is pu…
    - 6 days ago Wednesday, February 25, 2015 -
  • S4x15 Video: Kaspersky Control System OS

    S4x15 Video: Kaspersky Control System OS

    Kaspersky announced their project to develop a Control System OS back in October 2012. We tried to get them to present some details on the design criteria and goals at S4x13 and S4x14 without success. So we were very happy to have Andrey Nikishin giv…
    - 8 days ago Monday, February 23, 2015 -
  • How ‘Power fingerprint’ could improve security for ICS/SCADA systems

    How ‘Power fingerprint’ could improve security for ICS/SCADA systems

    Most people have heard that one way law enforcement can figure out who might be growing marijuana in their basement is to monitor power consumption.If a small house is sucking up as much electricity as two or three similar houses in the neighborhood,…
    - 8 days ago Monday, February 23, 2015 -
  • Securing Obama’s “Internet Cathedral” – Who are its priests?

    Securing Obama’s “Internet Cathedral” – Who are its priests?

    At last week’s Cyber Security Summit at Stanford, President Obama sought to reset his administration’s relationship with a tech community alienated by an endless stream of disclosures of the government’s penetration of technology companies to…
    - 13 days ago Wednesday, February 18, 2015 -
  • Get The ICS Security Research Newsletter

    Get The ICS Security Research Newsletter

    The ICS Security Research Newsletter has been dormant for a while now, but Reid Wightman and the team at Digital Bond Labs has resurrected it. They are committed to at least a quarterly issue in 2015. The first issue for 2015 includes: Information on…
    - 13 days ago Wednesday, February 18, 2015 -
  • Risky Clicks: End users cause the majority of security headaches

    Risky Clicks: End users cause the majority of security headaches

    In January 2015, Bromium conducted a survey of more than 100 information security professionals, focused on the greatest challenges and risks facing their organizations today. The results indicate that end users continue to remain the greatest sec…
    - 13 days ago Wednesday, February 18, 2015 -
  • Kaspersky SAS 2015 CablemeltingBAD
    Slides from Kaspersky SAS "SCADA in the cloud" talk. If you saw our 31C3 report you can start from the slide N36. Important quotesICS Cybersecurity definitiona process that ensures control object operation with no dangerous failures or damage, but w…
    - 14 days ago Tuesday, February 17, 2015 -
  • Unsolicited Response Podcast – Interview with Kim Zetter from S4x15

    Unsolicited Response Podcast – Interview with Kim Zetter from S4x15

    We had Kim Zetter on stage for an interview at ICSage during S4x15 Week to discuss her new book: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. This first 2015 episode of the Unsolicited Response Podcast features…
    - 14 days ago Tuesday, February 17, 2015 -
  • Siemens SIMATIC TIA Portal (Step 7/WinCC) fixes

    Siemens SIMATIC TIA Portal (Step 7/WinCC) fixes


    - 15 days ago Monday, February 16, 2015 -
  • ARC Forum Event

    ARC Forum Event

    The ARC Advisory Group invited me to participate in one of the security panels at the annual ARC Forum this week in Orlando. It’s an event I always wanted to check out so I spoke and attended. Here are some brief thoughts from the event. The best p…
    - 18 days ago Friday, February 13, 2015 -
  • S4x15 Video – Introducing IBAL for IDA Pro

    S4x15 Video – Introducing IBAL for IDA Pro

    Digital Bond Labs has been using the IDA Pro API to extend it and make it even more useful for gray / black box testing. At S4x15 Reid Wightman, who heads up the Labs, introduced the first IDA Binary Analysis Library (IBAL) that are released for publ…
    - 22 days ago Monday, February 9, 2015 -
  • Siemens Sighs: SCADA Bugs Abound

    - 26 days ago Thursday, February 5, 2015 -
  • S4x15 Video – Efficiently Testing Large Numbers of HART DTMs

    S4x15 Video – Efficiently Testing Large Numbers of HART DTMs

    Alexander Bolshev of Digital Security in Russia gave a great talk at S4x14 on exploiting vulnerabilities in the HART protocol and devices. His latest research is testing a large number of field devices accessible via the FDT Group’s Device Type Man…
    - 27 days ago Wednesday, February 4, 2015 -
  • The bots will find you

    The bots will find you

    I thought I would write a quick post to share some interesting web logs. I set up a very temporary server to make the CANBus Hacking class materials available for attendees. The server was available for about a week and not connected to anything or l…
    - 28 days ago Tuesday, February 3, 2015 -
  • Time to Get Progressive With ICS / IoT Cyber Security

    Time to Get Progressive With ICS / IoT Cyber Security

    Today we posted the video of Corey Thuen’s S4x15 Technical Session on the insecure by design Progressive Snapshot dongle. Progressive responded with a statement to a Forbes reporter: if an individual has credible evidence of a potential vulnerabili…
    - 29 days ago Monday, February 2, 2015 -
  • The Vicious Cycle of “Assuming Compromise”

    The Vicious Cycle of “Assuming Compromise”

    When you walk the floors of industry trade shows and speak with security vendors, one of the most predominant endpoint security myths is “assume you will be compromised.” Of course, this is a fallacy, but as a result of this axiom, the security i…
    - 32 days ago Friday, January 30, 2015 -
  • Cyber-security: Changing the Economics!

    Cyber-security: Changing the Economics!

       The impact of recent cyber attacks will be felt for years to come, perhaps having risen to a new level of hurt with the Target and Sony attacks. With a Fortune 500 CEO ousted and a Hollywood movie held hostage, cyber-security is on the minds of…
    - 35 days ago Tuesday, January 27, 2015 -
  • Internet Attack Could Shut Down US Gas Stations

    - 40 days ago Thursday, January 22, 2015 -
  • Attackers Planting Banking Trojans In Industrial Systems

    - 49 days ago Tuesday, January 13, 2015 -
  • 31C3: Too Smart Grid in da Cloud ++

    31C3: Too Smart Grid in da Cloud ++

    This year we want to discuss Green Energy. Our hackers' vision of Green Energy, SmartGrids and Cloud IoT technology.  Our latest research was devoted to the analysis of the architecture and implementation of the most wide spread platforms for wind a…
    - 63 days ago Tuesday, December 30, 2014 -
  • SOS! Secure Open SmartGrids!

    SOS! Secure Open SmartGrids!

    Dear all,After our 31C3 Too SmartGrid in da Cloud talk we get many questions about Solar and Wind plants vulnerabilities, Internet connected SmartGrid devices. Guys, sorry, but we don’t know yet.There are dozens of platforms, hundreds of vendors,…
    - 65 days ago Sunday, December 28, 2014 -
  • South Korea Nuclear Plant Hit By Hacker

    - 70 days ago Tuesday, December 23, 2014 -
  • Hack Attack Causes Massive Damage At Steel Works

    - 71 days ago Monday, December 22, 2014 -
  • Chasing the White Whale: How Advanced Attacks Leverage Spear Phishing

    Chasing the White Whale: How Advanced Attacks Leverage Spear Phishing

    Update: Breaking News: ICANN targeted in a spear phishing attack Information security becomes increasingly important as the frequency of cyber attacks increases. From Target to Sony, the past 12 months have played host to the largest volume of attack…
    - 77 days ago Tuesday, December 16, 2014 -
  • Well, Honeywell

    Well, Honeywell

    New knowledge about Honeywell Experion Process Knowledge System. Yes, you must patch it.Yes, it's all about grep +1 SSRF.Thanks to Alexander Tlyapov, Gleb Gritsai, Kirill Nesterov, Artem Chaykin and Ilya KarpovHoneywell advisory/patch:https://www.h…
    - 77 days ago Tuesday, December 16, 2014 -
  • Picture This: Sony Hack Won’t Be the Last

    Picture This: Sony Hack Won’t Be the Last

    The FBI has warned US companies of a wave of destructive cyber attacks, in light of the recent Sony hack. I commented to eSecurityPlanet and SecurityWeek: “These attacks are troublesome, but not surprising. Earlier this year we witnessed Code Space…
    - 82 days ago Thursday, December 11, 2014 -
  • Siemens patches critical SCADA flaws likely exploited in recent attacks
    Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.One of the vulnerabi…
    - 92 days ago Monday, December 1, 2014 -
  • BootKit via SMS

    BootKit via SMS

    One of demo from PacSec and ZeroNights.Short FAQQ: Is it BadUSB?A: Not exactly, but kind of. Can be applied to any Android gadget. Q: Is it local or remote stuff?A: Can be done remotely (web/sms) for 4G/3G modemsQ: Any threats to ICS?A: YesQ: Huawei?…
    - Wednesday, November 19, 2014 -
  • Is it time to Fire your network protection vendor?

    Is it time to Fire your network protection vendor?

    I hereby solemnly promise that Bromium will never have a product with “fire” in its name.  By now every vendor in the  next-gen IDS / IPS / Firewall / honeypot-as-ultimate-defense-against-the-dark-arts market has a next-gen “fire”-branded p…
    - Monday, November 10, 2014 -
  • An Unprecedented Look At Stuxnet, The World's First Digital Weapon

    - Monday, November 3, 2014 -
  • Different type of SCADA...

    Different type of SCADA...

    +Update http://blog.ptsecurity.com/2015/01/hacking-atm-with-raspberry-pi.htmlSlides and demo from Olga and Alex report on ATM hacking at Black Hat. MS08-067 strikes again. Now ATM.There are a lot of different kinds of SCADA... Click Enjoy...
    - Wednesday, October 29, 2014 -
  • BlackEnergy Malware Has Compromised Systems For 2 Years

    - Wednesday, October 29, 2014 -
  • Attack of the malicious document – what was old is new again

    Attack of the malicious document – what was old is new again

    Recent zero day attacks targeting Windows using malicious Office documents should be a reminder to all of us that no attack vector ever truly dies, it just lurks in the background waiting for it’s time to come again. Malicious Office documents have…
    - Wednesday, October 22, 2014 -
  • Many Eyes Make Credible Security

    Many Eyes Make Credible Security

    We are proud to announce the successful results of an independent source-code review and penetration test of vSentry version 2.4 by the leading security consultancy  IOActive – acknowledged as one of the world’s leading security firms serv…
    - Tuesday, October 14, 2014 -
  • What is my encryption key?

    What is my encryption key?

    Update for update for WinCC <7.3. Now for Siemens SIMATIC PCS 7 <8.1.Details: https://ics-cert.us-cert.gov/advisories/ICSA-14-205-02A
    - Thursday, October 9, 2014 -
  • Why is Bromium InDemand?

    Why is Bromium InDemand?

    Recently LinkedIn recognized Bromium as one of the 10 most InDemand startups in the Bay Area. Thank you LinkedIn, and thank you Bay Area Tech Community! A number of folks, prospective and current co-workers, investors, customers, and friends have per…
    - Friday, October 3, 2014 -
  • Threat Intelligence firm mistakes research for nation-state attack

    Threat Intelligence firm mistakes research for nation-state attack

    [Updates to this story appear on page two.]On Tuesday, Bloomberg published a story based on honeypot scans, which was a follow-up to a previously published piece that explored the nature of attacks against industrial-control systems.Bloomberg's stori…
    - Wednesday, October 1, 2014 -
  • Rogue cell towers discovered in Washington, D.C.

    Rogue cell towers discovered in Washington, D.C.

    Towards the end of July, ESD America, the makers of the ultra-secure CryptoPhone, said that their engineers and customers had discovered more than a dozen rogue cell towers (also known as interceptors or IMSI catchers) around the U.S.New information…
    - Wednesday, September 17, 2014 -
  • Goldilocks and the 3 Theres

    Goldilocks and the 3 Theres

      At VMWorld VMware SVP of Security Tom Korn described the hypervisor and virtual network environment of a virtual infrastructure platform as the “Goldilocks Zone” for application security in the software defined data center.  He was right.  A…
    - Thursday, September 11, 2014 -
  • Next-Gen IDS/IPSs: Caught between a ROC and a hard place

    Next-Gen IDS/IPSs: Caught between a ROC and a hard place

    The market appears to have revisited its irrational exuberance about next-gen network IDS/IPSs, perhaps because every major security vendor has one (truth be told, throwing traffic at a set of cloud- or appliance-hosted sacrificial VMs isn’t rock…
    - Monday, September 8, 2014 -
  • IDG Contributor Network: Tunnel vision: Train security as critical as planes and automobiles

    IDG Contributor Network: Tunnel vision: Train security as critical as planes and automobiles

    In recent weeks you’ve heard a lot of discussion around the cyber risks to aircraft and automobiles. After the Black Hat, DefCon and BSides conferences in Las Vegas, Nev., in July, it would seem that a great deal of necessary attention will be pai…
    - Monday, September 8, 2014 -
  • Black Hat Survey: End Users Remain Biggest Security Headache as Compromised Endpoints Increase

    Black Hat Survey: End Users Remain Biggest Security Headache as Compromised Endpoints Increase

    Earlier this year, Bromium published “Endpoint Protection: Attitudes and Opinions,” a statistical analysis of more than 300 information security professionals. The results revealed that endpoints are vulnerable, anti-virus is ineffective and end…
    - Wednesday, September 3, 2014 -
  • Industrial software website used in watering hole attack

    Industrial software website used in watering hole attack

    AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.The criminals responsible for the incident compromised an unnamed industrial software firm's website, suggesti…
    - Tuesday, September 2, 2014 -
  • Few bugs in Wonderware Information Server

    Few bugs in Wonderware Information Server

    Vulnerabilities/fixes in Schneider Electric/Invensys Wonderware Information Server (WIS) to support tradition.The following Schneider Electric WIS versions are affected:Wonderware Information Server 4.0 SP1 Portal,Wonderware Information Server 4.5 Po…
    - Monday, September 1, 2014 -
  • Not by SCADA alone: ATM hack @BH Europe

    Not by SCADA alone: ATM hack @BH Europe

    Alexey and Olga gonna speak @BlackHat 2014 EU on ATM security.Please be careful there!Hint
    - Monday, September 1, 2014 -
  • How a hacker could cause chaos on city streets

    How a hacker could cause chaos on city streets

    Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.That Hollywood scenario is what researchers at the University of Michigan proved could happen given the security…
    - Friday, August 29, 2014 -
  • Workers at U.S. nuclear regulator fooled by phishers

    Workers at U.S. nuclear regulator fooled by phishers

    Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period.The incidents were described in an inspector general report obtained by the public…
    - Tuesday, August 19, 2014 -
  • The Rise and Fall of Enterprise Security

    The Rise and Fall of Enterprise Security

    Every day, enterprises are bombarded by rapidly multiplying and morphing advanced threats—and current network and endpoint security solutions aren’t capable of defeating these targeted attacks. This year a major IT analyst wrote: “Advanced targ…
    - Thursday, August 14, 2014 -
  • IDG Contributor Network: Buckle up: Security threats to connected cars get real

    IDG Contributor Network: Buckle up:  Security threats to connected cars get real

    As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives.  It’s a good question.Tesla, one of the lea…
    - Tuesday, August 12, 2014 -
  • NIST Wants Better SCADA Security

    - Tuesday, August 12, 2014 -
  • In praise of seamless, small-footprint, light-weight, transparent endpoint security

    In praise of seamless, small-footprint, light-weight, transparent endpoint security

    In a recent blog, Rick Holland of Forrester Research takes aim at meaningless vendor epithets, such as “light-weight”, “non-invasive” and “small-footprint” used to describe their endpoint security products.  As he astutely observes, what…
    - Monday, July 28, 2014 -
  • Siemens SIMATIC WinCC 7.3: Vulnerabilities/Fixes

    Siemens SIMATIC WinCC 7.3: Vulnerabilities/Fixes

    New version of WinCC/new features/new advisories/new vulnerabilities. Kudos Gleb Gritsai, Dmitry Nagibin and Alexander Tlyapov .CVE-2014-4682/HTTP/sensitive data (session) leakage CVE-2014-4683/HTTP/remote privileges escalation (useful with CVE-2014-…
    - Wednesday, July 23, 2014 -
  • Microvisor + Hypervisor Makes Your VMs Secure by Design

    Microvisor + Hypervisor Makes Your VMs Secure by Design

    I often get asked whether micro-virtualization can be used with a traditional hypervisor and full-OS “fat” VMs (humor: FAT VMs are another matter). YES! There are powerful benefits in both client and server scenarios. I’ll focus on the user cen…
    - Wednesday, July 16, 2014 -
  • How do you spell “Polymorphic”?

    How do you spell “Polymorphic”?

    I guess the answer is “i r o n y”:  Last week a Bromium field employee searched for “polymorphic” on dictionary.com and was treated to a gloriously literal definition: The site dropped a banking Trojan! Although the user was unaware of th…
    - Tuesday, July 15, 2014 -
  • Detectible Dysfunction

    Detectible Dysfunction

    In 2003, security industry analyst Richard Stiennon famously declared that intrusion detection systems would be obsolete by 2005, writing at the time: “The underlying problem with IDS is that enterprises are investing in technology to detect intrus…
    - Thursday, July 10, 2014 -
  • If you had only one more security dollar…

    If you had only one more security dollar…

    what would you spend it on?   Improve endpoint security, or better protect your network or your applications? This was the topic debated by three Gartner security analysts: Neil MacDonald (endpoint), Greg Young (network) and Joseph Feiman (applicati…
    - Tuesday, July 8, 2014 -
  • New Resource Page for the latest on Havex / Dragonfly / Energetic Bear Campaign
    Get the latest on the current ICS cyber threat intelligence related to the Dragonfly / Energetic Bear campaign and the use of the Havex exploit, including new vectors exploiting trusted supplier software troganization.
    - Thursday, July 3, 2014 -
  • The Dawn Of A New Era In Corporate Cyber Threats?

    The Dawn Of A New Era In Corporate Cyber Threats?

      Cyber criminals know where the money is and have been attacking businesses in the hopes of getting a big payout for many years. Hacking and manipulating financial systems to steal money or customer credit and banking information to sell on the bla…
    - Tuesday, July 1, 2014 -
  • Energy Firms Hacked By Dragonfly Group

    - Tuesday, July 1, 2014 -
  • SCADA/ICS Systems Under Attack In Europe Stuxnet-Style

    - Thursday, June 26, 2014 -
  • Chrome Perfected (2/2): Protect Users and Sites on the Web

    Chrome Perfected (2/2): Protect Users and Sites on the Web

    In a previous post I described how Bromium makes Chrome fast and massively secure.   vSentry will always protect the endpoint from an attack via the browser – and the attack will be automatically remediated. But the browser itself manages valua…
    - Wednesday, June 25, 2014 -
  • Open Source Security in a Post-Heart Bleed World
    Join SCADAhacker and McAfee for the next Twitter #SecChat on "Open Source Security in a Post-Heart Bleed World" Thursday, June 26 from 11am-12pm PST. Details and RSVP available here. The June #SecChat will address current issues surrounding OpenSS…
    - Wednesday, June 25, 2014 -
  • Special Discount for Upcoming ICS Advanced Cyber Security Training
    Hurry and register for the next advanced cyber security training course "Understanding, Assessing and Security Industrial Control Systems" to be held August 11-15 at Lambeau Field, Green Bay. This will be an exciting week, as the famous Green Bay P…
    - Wednesday, June 25, 2014 -
  • Kali Linux Mirrors added to SCADAhacker
    Mirrors for Kali Linux 1.0.7 have been added to the Tools page. Authenticity can be validated by comparing the appropriate SHA1 hash value with those from the Kali website (kali.org).
    - Wednesday, June 25, 2014 -
  • Videos Now Available from KIACS 2014 in Kuwait
    All of the videos from the successful Kuwait Industrial Automation Cyber Security (KIACS) 2014 Conference in Kuwait City has been added to the Event Archives on the Home page.
    - Tuesday, June 24, 2014 -
  • New Tools Coming Soon to SCADAhacker!
    In addition to updated information regarding upcoming training and related cyber events on the Home page, details have been placed on the Tools page regarding the addition of some new how-to guides.
    - Tuesday, June 24, 2014 -
  • Culture clash: How physical security is impacted by cultural norms

    Culture clash: How physical security is impacted by cultural norms

    Physical perimeter security can differ from facility to facility, with myriad factors playing into what exactly is implemented, including budget and the assets that are being protected.But what about geographical location and, subsequently, culture?I…
    - Monday, June 23, 2014 -
  • The Implications of “Endpoint Protection: Attitudes and Opinions”

    The Implications of “Endpoint Protection: Attitudes and Opinions”

    Bromium has just published the results of “Endpoint Protection: Attitudes and Opinions,” a survey of more than 300 information security professionals, focused on end user threats and security. The majority of the respondents believe: Existing sec…
    - Wednesday, June 18, 2014 -
  • Chrome Perfected: Fast, Massively Secure and Gloriously Private (1/2)

    Chrome Perfected: Fast, Massively Secure and Gloriously Private (1/2)

    Bromium or Chromium?  The right answer is both.  Chrome users have an almost religious passion for their browser, whose rapid ascent threatens to eclipse IE.  Bromium’s micro-virtualized Chrome substantially surpasses Google’s own vision, deli…
    - Thursday, June 12, 2014 -
  • Confidence 2014 slides and releases

    Confidence 2014 slides and releases

    Nice update by @atimorin.Slides and tools:http://www.slideshare.net/AlexanderTimorin/scada-deep-inside-protocols-and-security-mechanismshttps://github.com/atimorin/scada-toolsHint from Code Monkey Hate Bug also: https://twitter.com/jadamcrain/status/…
    - Tuesday, June 10, 2014 -
  • <div dir="ltr" style="text-align:left;">At…

    <div dir="ltr" style="text-align:left;">At…

    At Positive Hack Days IV (www.phdays.com) we have a lot of fun.First of all we released more details about new vulnerabilities in Siemens WinCC OA, S7 1200 and S7 1500 PLC, ABB, SmartGrid and SCADA In the cloud. Please check out slides. SCADA Stran…
    - Sunday, June 8, 2014 -
  • Next and Final USA Course Scheduled for August 11-15 during Packer Training Camp in Green Bay
    The next and final ICS security course for 2014 in the USA has been scheduled for August 11-15 and will take place at the world famous Lambeau Field (Home of the Green Bay Packers) during their 2014 Training Camp! This advanced ICS course focused o…
    - Friday, June 6, 2014 -
  • How to use a cyber war exercise to improve your security program
    You may have missed it, but a few weeks ago a small cyber war played out in just 72 hours. Just after 6pm (PDT) on Sunday, May 18th, the first moves were made. The whole event was over by Wednesday evening.While not an actual war, the cyber war strat…
    - Friday, June 6, 2014 -
  • University researchers test cyber-defense for nation's power grid

    University researchers test cyber-defense for nation's power grid

    University researchers are testing whether a distributed computing system could be used to prevent a major blackout during a cyberattack on the nation's power grid.Scientists from North Carolina State University and the University of North Carolina,…
    - Friday, May 30, 2014 -
  • ICS Cyber Security Events
    Stay informed of the latest cyber security events and conferences directly related to Industrial Control Systems on SCADAhacker.com
    - Thursday, May 29, 2014 -
  • Emerson DeltaV Vulnerabilities/Fixes

    Emerson DeltaV Vulnerabilities/Fixes

    DeltaV Versions 10.3.1, 11.3, 11.3.1, and 12.3Can be related to Emerson AMS Device Management version, Emerson AMS Wireless SNAP-ON also.CVE-2014-2349 - World writable system folderCVE-2014-2350 - Hardcoded credentialsPlease find fixes in KBA NK-1400…
    - Monday, May 26, 2014 -
  • Lightning Strikes Twice: First Target, Now eBay

    Lightning Strikes Twice: First Target, Now eBay

    This morning, Graham Cluley Security News broke the news that eBay confirmed a security breach that could impact 128 million active users. According to eBay, the compromised database contains user names, encrypted passwords, email addresses, physical…
    - Wednesday, May 21, 2014 -
  • US Public Utility Compromised By Brute-Force Cyber Attack

    - Wednesday, May 21, 2014 -

IT News

Youtube News - CyberSecurity

Understanding new threats to privacy and cybersecurity
In this episode of Case in Point, Anita Allen and Lisa Sotto examine trends in privacy and cybersecurity, what we mean when we talk about our right to privacy, and more.
- 44 mins ago Tuesday, March 3, 2015 -
What is Cybersecurity at Home?
Alan Davidson (moderator) – Vice President, Open Technology Institute, New AmericaThe Honorable Suzanne Spaulding – Under Secretary, National Protection and Programs Directorate, U.S. ...
- 4 hours ago Tuesday, March 3, 2015 -
NSA Cyber Security Competition
2015 – DoD News highlights an article on the Armed with Science website which talks about a cyber security paper competition held by the National Security Agency. You can find this article...
- 5 hours ago Tuesday, March 3, 2015 -
Reel Cybersecurity Summit

- 5 hours ago Tuesday, March 3, 2015 -
What Infosec Means
Video shows what infosec means. Information security.. infosec pronunciation. How to pronounce, definition by Wiktionary dictionary. infosec meaning. Powered by MaryTTS.
- 7 hours ago Tuesday, March 3, 2015 -
Innominate’s cybersecurity warning
Warnings about cybersecurity weaknesses of industrial equipment are not new. By asking a security consultant to conduct a live demonstration of connected devices' hacking during SPS, Innominate...
- 7 hours ago Tuesday, March 3, 2015 -
What Cybersecurity Means
Video shows what cybersecurity means. Security against electronic attacks such as cyberwarfare.. cybersecurity pronunciation. How to pronounce, definition by Wiktionary dictionary. cybersecurity...
- 8 hours ago Tuesday, March 3, 2015 -
Cyber Week 2014 - The 4th Annual International Cybersecurity Conference - Full Clip

- 11 hours ago Tuesday, March 3, 2015 -
How to Pronounce Cybersecurity
This video shows you how to pronounce Cybersecurity.
- 14 hours ago Tuesday, March 3, 2015 -
How Can Cyber Security Be Improved? Richard Clarke on Threats & Computer Infrastructure (2
How Can Cyber Security Be Improved? Richard Clarke on Threats & Computer Infrastructure (2010) On July 1, 2009, Senator Jay Rockefeller (D-WV) introduced the Cybersecurity Act of 2009 - S....
- 24 hours ago Monday, March 2, 2015 -
3-5-2015 Cybersecurity: The Evolving Nature of Cyber Threats
Learn more at http://Oversight.House.Gov.
- 1 day ago Monday, March 2, 2015 -
Cybersecurity - Your Company Must Change Its Mind
We are used to the physical world, not the digital world - and how that leads to security problems for your business. David Stelzl speaks in Raleigh-Durham at Security Summit, January 29,...
- 1 day ago Monday, March 2, 2015 -

InfoSec Podcasts

  • newISC StormCast for Tuesday, March 3rd 2015
    Lenovo Made $250k With Superfishhttp://www.forbes.com/sites/thomasbrewster/2015/02/27/lenovo-got-very-little-from-superfish-deal/Android Spotty Support for Full Disk Encryptionhttp://www.theregister.co.uk/2015/03/02/google_encrypted_by_default/ICANN…
    - 19 hours ago Monday, March 2, 2015 -
  • newEpisode 154 - Open Source Architecture w/@mubix
     Martin & Steve get a change to talk to Rob Fuller (@mubix) about his ideas on Open Source Architecture.  It's a great conversation where you can see the idea grow in front of your own ears! The link to the Open Source Architecture group is: …
    - 21 hours ago Monday, March 2, 2015 -
  • newDtSR Episode 132 - Good Guys, Bad Guys, and Reality
    In this episode...We learn the origins of "RSnake" as told by Rob himselfRob gives us a peek into the dark side, from his contacts and experiencesWe discuss the black-hat economy as it's verticalized, specialized, and maturedRob discusses the bal…
    - 2 days ago Monday, March 2, 2015 -
  • newISC StormCast for Monday, March 2nd 2015
    Seagate NAS Remote Code Execution Vulnerabilityhttps://beyondbinary.io/advisory/seagate-nas-rce/Major Xen Vulnerability To Arrive Soonhttps://aws.amazon.com/premiumsupport/maintenance-2015-03/D-Link / Trendnet Vulnerabilitieshttps://github.com/darkar…
    - 2 days ago Sunday, March 1, 2015 -
  • ISC StormCast for Friday, February 27th 2015
    HTTP/2 and Firefox 36https://www.mozilla.org/en-US/firefox/36.0/releasenotes/https://tools.ietf.org/html/draft-ietf-httpbis-http2-17Comparing 2014 Vulnerability Statistics Between Operating Systemshttp://www.gfi.com/blog/most-vulnerable-operating-sys…
    - 5 days ago Thursday, February 26, 2015 -
  • Chet Chat 187 - Feb 25, 2015
    Sophos expert John Shier sits in for regular presenter Chester Wisniewski in this episode.John and Paul Ducklin dissect the latest security issues, which were dominated this week by some thorny matters of cryptography.
    - 5 days ago Thursday, February 26, 2015 -
  • Risky Business #355 -- Gemalto op exposes cellphone crypto flaws
    On this week's show we're speaking with Philippe Langlois. You may remember him as the founder of Qualys in the 90s, but these days he's the CEO and founder of P1 Security, a telecommunications security firm. He'll be joining us to discuss the NSA an…
    - 6 days ago Thursday, February 26, 2015 -
  • ISC StormCast for Thursday, February 26th 2015
    Gemalto Claims SIM Keys Not Leakedhttp://www.gemalto.com/press/Pages/Gemalto-presents-the-findings-of-its-investigations-into-the-alleged-hacking-of-SIM-card-encryption-keys.aspxLizard Squad Redirects Lenovo.com Domainhttp://www.theregister.co.uk/201…
    - 6 days ago Wednesday, February 25, 2015 -
  • ISC StormCast for Wednesday, February 25th 2015
    PrivDog bites SSL Securityhttp://www.kb.cert.org/vuls/id/366544Samba Vulnerabilityhttps://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/Visa to Use Tokenization in Australiahttp://visa.com.au/aboutvisa/research/include/Tokenisa…
    - 7 days ago Tuesday, February 24, 2015 -
  • ISC StormCast for Tuesday, February 24th 2015
    Battery usage to trace phoneshttp://arxiv.org/pdf/1502.03182v1.pdfFonts to trace usershttp://fontfeed.com/archives/google-webfonts-the-spy-inside/older article: http://www.itbusiness.ca/news/44120/44120Debian Tracking Binaries Back to Sourcehttps://t…
    - 8 days ago Monday, February 23, 2015 -
  • DtSR Episode 131 - NewsCast for February 23rd, 2015
    In this episode--Would you be OK with your credit card company tracking you, to decrease fraud rates? Visa wants to track your smartphone.http://triblive.com/business/headlines/7774328-74/visa-card-fraudYour stolen healthcare data is increasingly…
    - 9 days ago Monday, February 23, 2015 -
  • ISC StormCast for Monday, February 23rd 2015
    Symantec AV + TrueCrypt = BSODhttp://community.norton.com/en/forums/long-story-norton-bsod-me-when-i-use-truecryptSymentec AV blocks IE 11https://community.norton.com/en/forums/tonights-update-crashing-ie11More Superfish newshttps://www.facebook.com/…
    - 9 days ago Sunday, February 22, 2015 -
  • ISC StormCast for Friday, February 20th 2015
    More VBA Macros and Tax Scamshttps://isc.sans.edu/forums/diary/Fast+analysis+of+a+Tax+Scam/19355/Lenovo Implanted an SSL Backdoor in Your Laptophttp://news.lenovo.com/article_display.cfm?article_id=1929SIM Cards Compromised by Intelligence Agenciesht…
    - 12 days ago Thursday, February 19, 2015 -
  • Risky Business #354 -- Breaking exploit automation
    On this week's show we're chatting with Assured Information Security senior research engineer Jacob Torrey about some work he's due to present at SysCAN and Infiltrate. It's called HARES, and it's basically a pretty impressive party trick that makes…
    - 12 days ago Thursday, February 19, 2015 -
  • ISC StormCast for Thursday, February 19th 2015
    Analyzing Office Macroshttps://isc.sans.edu/forums/diary/Macros+Really/19349/Rate limiting to mitigate DNS DDoS attackshttps://isc.sans.edu/forums/diary/DNSbased+DDoS/19351/NetGear "Genie" SOAP Interface Vulnerabilityhttps://github.com/darkarnium/sec…
    - 13 days ago Wednesday, February 18, 2015 -
  • Chet Chat 186 - Feb 18, 2015
    Join Sophos experts Chester Wisniewski and Paul Ducklin for the latest "Chet Chat" podcast.A quarter-hour of focused and well-informed discussion to help you make the best of the week's security news.
    - 13 days ago Wednesday, February 18, 2015 -
  • ISC StormCast for Wednesday, February 18th 2015
    oclHashcat Update and Building a Brute Forcing Righttps://isc.sans.edu/forums/diary/oclHashcat+133+Released/19339/Windows 10 To Include FIDO Supporthttp://blogs.windows.com/business/2015/02/13/microsoft-announces-fido-support-coming-to-windows-10/Sho…
    - 14 days ago Tuesday, February 17, 2015 -
  • ISC StormCast for Tuesday, February 17th 2015
    Summary of MSFT Patch Failureshttps://isc.sans.edu/forums/diary/Microsoft+Patch+Mayhem+February+Patch+Failure+Summary/19337/MongoDB Security Guide Releasedhttp://docs.mongodb.org/manual/administration/security-checklist/MSFT Adding HTTP Strict Transp…
    - 15 days ago Monday, February 16, 2015 -
  • Episode 153 - Internet Veapon
    Episode 153 - Internet Veapon The gang braved the snow to get a show together tonight, here's what they covered: $17 mill-yun dollars scammed from Omaha company… A cautionary tale on business process controls... http://www.csoonline.com/article/288…
    - 15 days ago Monday, February 16, 2015 -
  • DtSR Episode 130 - Where Law and Cyber Collide
    In this episodeTraveler's Insurance files suit against a web developmeent company for failing to provide adequate security, resulting in a breach of one of its customershttp://www.law360.com/articles/614158/travelers-blames-web-designer-in-bank-web…
    - 16 days ago Monday, February 16, 2015 -
  • ISC StormCast for Monday, February 16th 2015
    More Microsoft Patch Troublehttp://windowsitpro.com/msrc/patch-tuesday-microsoft-removes-kb2920732-breaks-powerpointhttps://isc.sans.edu/forums/diary/Microsoft+February+Patch+Failures+Continue+KB3023607+vs+Cisco+AnyConnect+Client/19331/Kaspesky Revea…
    - 16 days ago Sunday, February 15, 2015 -
  • Chet Chat 185 - Feb 12, 2015
    Our weekly "Chet Chat" podcast is carefully prepared to fit into a quarter-hour, so it is clear and concise as well as being witty and amusing. Join Sophos experts Chester Wisniewski and Paul Ducklin as they dig into the latest computer security ne…
    - 18 days ago Friday, February 13, 2015 -
  • ISC StormCast for Friday, February 13th 2015
    Netatmo Weather Station Sends Clear Text WPA Password Back to Cloudhttps://isc.sans.edu/forums/diary/Did+You+Remove+That+Debug+Code+Netatmo+Weather+Station+Sending+WPA+Passphrase+in+the+Clear/19327/Configure Microsoft's UNC Hardened Accesshttp://supp…
    - 19 days ago Thursday, February 12, 2015 -
  • Risky Business #353 -- Andy Greenberg: Why I feel sorry for Ross Ulbricht
    This week's feature interview is with Andy Greenberg, senior writer with WIRED. He's covered Silk Road from the get go, even scoring an in depth interview with DPR before he was caught and unmasked as Ross Ulbricht. He attended every day of Ulbricht'…
    - 20 days ago Wednesday, February 11, 2015 -
  • ISC StormCast for Thursday, February 12th 2015
    PCI Did Not Kill HTTPS, Only SSLhttps://isc.sans.edu/forums/diary/Did+PCI+Just+Kill+ECommerce+By+Saying+SSL+is+Not+Sufficient+For+Payment+Info+spoiler+TLSSSL/19323/Gas Station Sensors Attacked by Anonymoushttp://blog.trendmicro.com/trendlabs-security…
    - 20 days ago Wednesday, February 11, 2015 -