11 Results for



Italian researcher finds more SCADA holes

Researcher says he's got more serious vulnerabilities to unveil.

By September 16, 2011


Researchers warn of SCADA equipment discoverable via Google

Google searches find critical infrastructure equipment that could be remotely controlled over the Internet.

By August 2, 2011


Expert hacks car system, says problems reach to SCADA systems

Embedded systems that rely on cellular networks and lack authentication and encryption have holes that attackers can easily exploit, researcher says.

By July 26, 2011


U.S. warns of security holes in Chinese SCADA apps

Software employed in critical infrastructure systems in the U.S. and other nations carries security bugs that attackers could take advantage of, says the Department of Homeland Security.

By June 17, 2011


SCADA hack talk canceled after U.S., Siemens request

Researchers had planned to demonstrate how to break into critical infrastructure systems.

By May 18, 2011


U.S. warns of more SCADA software holes

Cybersecurity officials are busy issuing warnings as researchers keep disclosing new holes in software used to manage systems at utilities and other industrial plants.

By March 24, 2011


U.S. warns SCADA systems at risk

Federal cybersecurity group issues warnings about tools that could be used to attack critical infrastructure systems like power companies and utilities, following release of exploits.

By March 22, 2011


Serious hole in critical-infrastructure software, says U.S.

U.S. government warns critical-infrastructure operators of serious hole in "SCADA" software used in oil and gas; water; electric utilities; and manufacturing plants around world.

By May 12, 2011


Energy plant hack all wind, says operator

There's no proof that a suspected hacking attack on SCADA systems of a Florida-based energy plant actually occurred, according to the operator, NextEra Energy Resources.

By April 18, 2011


Expert: Critical system flaws a 'ticking time bomb'

Combining legacy SCADA systems that have their own weaknesses with Internet technologies is a dangerous mix for protecting systems that provide energy, water and other basic needs, Black Hat presenter says.

By July 28, 2010