Artikel zum Thema "ICS" bei CIO.de

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be

While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn't such things be considered an issue » zum Artikel

Energy sector a prime target for cyber attacks

Any government that wants to set priorities for cybersecurity should probably put its energy infrastructure close to the top. » zum Artikel

Industrial control systems targeted by malicious attackers, research shows

Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. » zum Artikel

IT security vendors seen as clueless on industrial control systems

Many IT security vendors have a minimal understanding of industrial control systems (ICS) and try to sell technology that could easily damage the devices found in plants running the nation's critical infrastructure, experts say. » zum Artikel

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance'

The latest draft of the Cyber Security Framework (CSF) mandated by President Barack Obama in February fails to provide an effective battle plan for defending the nation's critical infrastructure, experts say. » zum Artikel

Boeing technology offers secure, efficient way to tie together business, industrial nets

The Boeing Company is pioneering a way to securely bring together business IT networks with what ordinarily are entirely separate networks for industrial-control systems (ICS) in order to gain efficiencies and benefits in information-sharing in manufacturing. » zum Artikel

NIST's finalized cybersecurity framework receives mixed reviews

There has never been a successful catastrophic cyberattack on North America's critical infrastructure (CI) -- yet. » zum Artikel

Nation's critical infrastructure cyber defenses weak, DHS tells hearing

The nation's critical infrastructure is vulnerable to cyber attacks and better information sharing is needed to strengthen defenses. » zum Artikel

Stuxnet creators defined 21st century warfare

Stuxnet creators recognized they had built the world's first true cyber-weapon and were more interested in pushing the envelope of this new type of digital warfare than causing large-scale destruction within targeted Iranian nuclear facilities, a study shows. » zum Artikel

Online information poses cyber risk for UK critical infrastructure, report claims

Data published online by industrial firms could be used to mount a cyber attack against UK critical infrastructure, according to research published by the Institution of Engineering and Technology (IET). » zum Artikel

Asana adds calendars to its workplace task management app

Asana has developed a calendar component for its social task management application, giving users another option for monitoring the progress of individual and team projects. » zum Artikel

Researchers find hundreds of insecure building control systems

Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. » zum Artikel

Critical infrastructure protection: Are we prepared for a massive cyberattack on U.S. systems

There is no debate in the security community that the nation needs to protect its critical infrastructure (CI) from cyber attacks. But not everybody agrees that all infrastructure sectors are equally critical. » zum Artikel

Control system hack at manufacturer raises red flag

An unreported attack on the energy management system of a New Jersey manufacturer has been revealed by the U.S. Cyber Emergency Response Team (US-CERT). » zum Artikel

Google to let users download portable file with all their Gmail messages

In a major move for data portability, Google will let users download their entire set of Gmail messages in a single file and do the same with their Google Calendar items. » zum Artikel

NIST framework released to widespread praise, but what happens next

Following a solid year of intensive work, the National Institute of Standards and Technology (NIST) released yesterday its "final" framework for improving critical infrastructure cybersecurity as mandated under a February 2013 executive order by President Obama. The 41-page document closely tracks, with some notable changes, the preliminary framework released by NIST in November. » zum Artikel

Vulnerable terminal servers reflect bigger security problem

Security weaknesses uncovered in terminal servers used to provide an Internet connection to a wide variety of business and industrial equipment exemplify the risk inherent in adapting older systems to modern technology, experts say. » zum Artikel

Researchers find hundreds of insecure building control systems

Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. » zum Artikel

Security industry in 'rut,' struggling to keep up with cybercriminals

Dramatic changes are needed in multiple fronts if the security industry hopes to move ahead of cybercriminals, who are continuously finding new ways to breach corporate systems, experts say. » zum Artikel

Researchers develop industrial systems that watch for security breaches

University researchers have developed a methodology for enabling networked devices in an industrial control system (ICS) to police each other for abnormal behavior that would indicate a compromise. » zum Artikel

Cybercrime booming in Latin America and Caribbean, Trend Micro finds

Internet criminals have opened a new front in Latin America and the Caribbean and seem to have founded booming businesses thanks to low levels of cybercrime protection and awareness, a rare but timely analysis of the region by Trend Micro has found. » zum Artikel

Keep your calendar out of the cloud with Efficient Calendar

When it comes to desktop calendar software on the PC, there is little argument that the big dog in the park is Microsoft Outlook. However, while Outlook comes with a hefty feature set, it also comes with a hefty price tag--more than most people would want to pay to schedule their time. Efficient Calendar takes the core calendar functions of Outlook into a standalone desktop application at a small ... » zum Artikel

All about calendar sharing

Last week we took a very long look at the workings of Mountain Lion's Calendar application. This week, we'll delve into some of the details. Specifically, getting calendars in and out of the application and how to use Calendar with services such as Google and Yahoo. » zum Artikel

How to import calendars

Apparently my recent Mac 101 column on using Mountain Lion's Calendar has unearthed a lot of questions. Reader Michael Wolfson has one about Calendar and holidays. » zum Artikel

Trend Micro: Hacker threats to water supplies are real

A security researcher has shown that hackers, including an infamous group from China, are trying to break into the control systems tied to water supplies in the U.S. and other countries. » zum Artikel

SCADA vendor faces public backlash over bug bounty program

Bug bounty programs are rather popular these days. Companies such as Google, Microsoft, and Mozilla pay respectable amounts of money to researchers who disclose vulnerabilities to them. While the argument can be made that some vulnerabilities are worth far more on the open market than the bounty paid, most vendors respect this and offer as much as they can, but do so knowing they can't compete with ... » zum Artikel

DHS warns of spear-phishing campaign against energy companies

The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. » zum Artikel

Fantastical 2 for iPhone: Calendar app gets more fantastic for iOS 7

Thanks to its intuitive interface and outstanding natural-language event-creation capabilities, the original version of Fantastical for the iPhone has been the rare static icon on my otherwise continually evolving Home screen. Put simply, it's a much better calendar than Calendar--at least for my needs. » zum Artikel

All about Reminders

Whether it's to pay the bills, replace furnace filters, or take the ferret to the vet for its annual cleaning, we all need reminding from time to time. Yes, you can accomplish this through a calendar event and alarm, but a calendar is too broad a tool for this kind of thing. What you really need is the digital equivalent of a scrap of paper onto which you write notes and shove into a handy pocket. ... » zum Artikel

How to manage and repair your Android apps

Tablets, smartphones, and PCs look different on the outside, but on the inside they rely on the same components: a processor, a GPU, memory, and a storage volume that holds an operating system, device drivers, and applications. Your phone and tablet have smaller screens and fewer peripherals than a typical PC has, but you still end up tapping and clicking your way through your data before pulling ... » zum Artikel


Artikel zum Thema "ICS" im IDG-Netzwerk
 

Industrieanlagen wie Automatisierungs-, Prozesssteuerungs- und Prozessleitsysteme (Industrial Control Systems, kurz ICS) fliegen oft unter dem Radar von IT-Security-Fachleuten. Das BSI möchte das ändern.
While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn't such things be considered an issue
Industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users, according to a security researcher from security startup Cylance.