Narrow your search
Researcher says he's got more serious vulnerabilities to unveil.
Google searches find critical infrastructure equipment that could be remotely controlled over the Internet.
Embedded systems that rely on cellular networks and lack authentication and encryption have holes that attackers can easily exploit, researcher says.
Software employed in critical infrastructure systems in the U.S. and other nations carries security bugs that attackers could take advantage of, says the Department of Homeland Security.
Researchers had planned to demonstrate how to break into critical infrastructure systems.
Security firm Mandiant delivers compelling evidence that the Chinese military is behind a torrent of intrusions targeting the networks of U.S.-based companies. Here's what happens next.
Cybersecurity officials are busy issuing warnings as researchers keep disclosing new holes in software used to manage systems at utilities and other industrial plants.
Federal cybersecurity group issues warnings about tools that could be used to attack critical infrastructure systems like power companies and utilities, following release of exploits.
The operating system is meant to protect industrial systems from cyberattack by preventing any third-party code from executing.
Files were affected during compromise, says company that makes software used in the "smart" electric grid.