Archive for January, 2013

The Myth of Rip and Replace in SCADA and Industrial Control Systems #cybersecurity #pauto #SCADA @tofino @digitalbond

Recently, Eugene Kaspersky made headlines about designing an operating system for industrial control systems. It doesn’t seem to have gone anywhere, as you might expect.read more

Narcissism as a cyber threat

Given the “pre-decision” by the Department of Defense, today I should probably be writing about cyber threats: the current reality, catastrophic possibilities, strong probabilities, and treacherous implications of both passive and active cy…

Loss of Control (LOC) and Loss of View (LOV) incidents are very dangerous and not uncommon

In the IT environment a denial-of-service is one of the worst case scenarios. In this case, data can no longer move and the system comes to a stop. In the ICS environment, the worst case scenario is loss of control (LOC) and/or loss of view (LOV). That…

Loss of Control (LOC) and Loss of View (LOV) incidents are very dangerous and not uncommon

In the IT environment a denial-of-service is one of the worst case scenarios. In this case, data can no longer move and the system comes to a stop. In the ICS environment, the worst case scenario is loss of control (LOC) and/or loss of view (LOV). That…

We can do better

Today’s post is written by Max Geron, a law enforcement official I work with occasionally.   Atlantic correspondent James Fallows wrote the other day about the lawsuit filed by Shoshana Hebshi, an American citizen who, according to her compl…

Why are unintentional ICS cyber incidents important to address

NIST defines a cyber incident to be communications between systems (or people and systems) that affect confidentiality, integrity, or availability. The NIST definition does not require an incident to be malicious to be defined as a cyber incident. Ther…

CAREFUL attention should be paid to Northern Africa and terrorism…

Not too long ago, Phil argued that “Attention must be paid” to events unfolding in Northern Africa regarding terrorist risk: Those on the US East and Gulf Coasts have learned to pay attention to weather patterns over the Sahara to provide e…

ICS-CERT has released an Advisory titled "ICSA-13-024-01 – Beijer Electronics ADP and H-Designer Buffer Overflow Vulnerability" (PDF)

This Advisory provides mitigation details for a buffer overflow vulnerability in multiple Beijer Electronics' ADP and H-designer products.

ICS-CERT has released an Advisory titled "ICSA-13-024-01 – Beijer Electronics ADP and H-Designer Buffer Overflow Vulnerability" (PDF)

This Advisory provides mitigation details for a buffer overflow vulnerability in multiple Beijer Electronics' ADP and H-designer products.

ICS-CERT has released an Advisory titled "ICSA-13-024-01 – Beijer Electronics ADP and H-Designer Buffer Overflow Vulnerability" (PDF)

This Advisory provides mitigation details for a buffer overflow vulnerability in multiple Beijer Electronics' ADP and H-designer products.