HackDig : Dig high-quality web security articles for hackers

Lesson Learned From Stuxnet

Security researchers discovered Stuxnet in 2010, and it has since become one of the most well-known malware campaigns in history. The cybercriminals behind the attack developed the infamous worm to damage programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems using four zero-day vulnerabilities in Microsoft Windows
Publish At:2017-03-10 12:10 | Read:3695 | Comments:0 | Tags:Energy and Utility Infrastructure Protection Energy Industry

The Future of Cybersecurity

You can’t discuss the future of cybersecurity without considering emerging trends in technology and threat landscapes. As organizations develop and adopt technologies related to big data, cognitive computing and the Internet of Things (IoT), cyberthreats are growing in both volume and complexity. The race is on to secure these systems and devices befor
Publish At:2017-02-10 13:10 | Read:3948 | Comments:0 | Tags:Application Security Cognitive Data Protection Energy and Ut

2016: The Year of the DDoS Attack

Some malware incidents will go down in history. The IT industry remembers 2006, for example, as the year of Stuxnet, an infamous worm that drew public attention to the insecurity of supervisory control and data acquisition (SCADA) and programmable logic controller (PLC) systems. I’m quite sure that 2016 will be similarly defined as the year of the dist
Publish At:2016-12-16 21:05 | Read:3421 | Comments:0 | Tags:Energy and Utility Network & Endpoint Botnet Connected Devic

Inside the Mason-IBM-NSF Insights for Securing Industrial Control Systems

The Mason-IBM-NSF April 2015 conference engaged industry, academia and government in a dialogue to address the challenges and uncertainties associated with securing industrial control systems (ICS) and processes, including supervisory control and data acquisition (SCADA) systems. It also made recommendations on possible actions and steps for industry leaders
Publish At:2016-01-01 14:25 | Read:3466 | Comments:0 | Tags:Energy and Utility Infrastructure Protection Energy and Util

Bits, Bytes, Bucks and Barrels: The Convergence of Cognitive Energy and Information Security

The actress Sharon Stone famously noted that the world’s greatest dancer was not, as commonly considered, Fred Astaire. Rather, it was Fred’s dancing partner Ginger Rogers, who matched every step that he did, but backwards and in high heels. A somewhat similar thought arises concerning Sir Isaac Newton, who not only wrote a book, “The Princ
Publish At:2015-11-05 09:25 | Read:3331 | Comments:0 | Tags:Energy and Utility Cybersecurity Energy and Utilities Energy

Green Energy: Do Renewable Resources Demand New Cybersecurity Best Practices?

Green energy is on the rise. According to the International Energy Agency (IEA), global dependence on renewable energy sources has increased steadily over the last few years. But as existing power producers and new players make the switch to solar-, wind- and water-powered alternatives, what happens to existing network borders? Are renewable resources the ha
Publish At:2015-09-30 02:05 | Read:3448 | Comments:0 | Tags:Energy and Utility Government and Federal Best Practices Cyb

The InfoSecond, Sept. 21–25: Connected Cars, Cloud Enforcer and More!

New Season, New Format Don’t adjust your video player: the format of The InfoSecond has in fact been altered, albeit slightly. While the goal of highlighting key security stories remains, we’ve added a focus on brevity in an effort to deliver you the top infosec and cybersecurity stories even faster! On the docket this week, we’ve got stori
Publish At:2015-09-27 20:45 | Read:4282 | Comments:0 | Tags:Cloud Security Data Protection Energy and Utility Connected

Cyberthreat Information Sharing in the Energy Sector

Information sharing about cyberthreats and cybersecurity is a key element of protection for every industry. Malicious attackers share information, and their intended victims also benefit from sharing what they learn about ongoing and potential threats. But sharing threat and security information is particularly critical for the energy sector for a variety of
Publish At:2015-09-22 00:05 | Read:3967 | Comments:0 | Tags:Energy and Utility Cybersecurity energy and utilities Energy

Embrace Green Energy Initiatives — With an Eye Toward Security

When we think of green energy initiatives, our mind often travels in many different directions depending upon context. Many think of green energy sources such as wind, hydro, solar and tidal power generation, all of which fall under the rubric of renewable and green; for others, it means adjusting the expenditures of energy in the conduct of their business i
Publish At:2015-09-17 14:25 | Read:4221 | Comments:0 | Tags:Data Protection Energy and Utility Bring-Your-Own-Device (BY

Should the Energy Production Industry Consider Cybersecurity?

Security measures for energy production plants were formerly focused on the physical security of the plant, including considerations for the perimeter and reliable procedures. Years ago, cybersecurity was not considered so vital because energy production plants were based on SCADA systems that were closed off and ran on proprietary protocols. But are these s
Publish At:2015-01-23 11:30 | Read:4752 | Comments:0 | Tags:CISO Cloud Security Energy and Utility Cyberattack Energy In

Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions

New Configuration of Citadel Trojan Discovered by IBM Trusteer Researchers In these days of endless breaches, securing user access by enforcing unique, complex passwords and strong authentication is imperative. The onslaught of data breaches in the past year alone, with the majority of the breaches involving compromised credentials, forced users to constantl
Publish At:2014-11-20 03:50 | Read:4821 | Comments:0 | Tags:Banking & Financial Services Energy and Utility Malware Adva

Massively Distributed Citadel Malware Targets Middle Eastern Petrochemical Organizations

Recently, IBM Trusteer researchers identified targeted cyber attacks on several Middle Eastern petrochemical companies. They have identified a campaign in which attackers are using a variant of the evasive Citadel malware. Citadel was originally created for the purpose of stealing money from banks and has been massively distributed on users’ PCs around
Publish At:2014-09-16 08:10 | Read:4586 | Comments:0 | Tags:Energy and Utility Malware Advanced Persistent Threats (APT)


Share high-quality web security related articles with you:)