Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa software. Several thousands of critical infrastructure may still be vulnerable to SCADA flaws public disclosed this week. It has been estimated that more than 7,600 different chemicals, power and petrochemical plants are affected by the bugs disclosed […]
IT administrator at Monju Nuclear Power Plant discovered that a malware-based attack infected a system in the reactor control room. On January 2nd one of the eight computers in the control room at Monju Nuclear Power Plant was compromised. An IT administrator has discovered that the system in the reactor control room had been accessed over […]
The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance in the case of cyber attacks. NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a […]
Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system of a water facility. The researchers deployed a honeypot to collect evidences on the attackers that […]
Media agencies reported news of a cyber attack against the Istanbul Ataturk International Airport, the passport control system at the departure terminal was hit causing many problems at the airport. The Turkish authorities diffused the news of a cyber attack against the Istanbul Ataturk International Airport. Official sources revealed that the passport control system at the […]
âSecuring Cyberspace in a borderless world: Vision 2015 and Beyondâ is the title of a High Level Dialogue that was held during The World Summit on the Information Society Forum (WSIS) 2013. The World Summit on the Information Society Forum (WSIS) represents the worldâs largest annual gathering of the ICT for development community, the event is organized […]
The systems of the US Army Corps of Engineersâ National Inventory of Dams (NID) were hacked back in January by hacker probably having Chinese origin. The systems of the US Army Corps of Engineersâ National Inventory of Dams (NID) were hacked back in January by hackers probably having Chinese origin, the discovery has been made […]
As expected happened, just yesterday I wrote about a large scale cyber attack against North Korea that blocked internet activities of the country bringing down almost all of all websites, today South Korean authorities are facing with a hacking attack against an Internet provider that brought down the servers of three broadcasters and two major […]
The week ended in the worst way for the security company Bit9 that last Friday announced that hackers had stolen digital certificates from its network and have utilized it to sign malicious code. Bit9 is a popular a company that provides software and network security services to a lot of important private firms and also to […]
Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal information; or about cyber attacks that target critical infrastructure. The principal question raised by these fervent activities are rules of engagement and proportionality of defense – the operative limit of country that discovers an attack […]