A former IT consultant for an oil and gas exploration company has pleaded guilty to tampering with the company's computer systems after he was turned down for a permanent position with the company....
Gasoline refineries, manufacturing plants and other critical facilities that rely on computerized control systems just became more vulnerable to tampering or sabotage with the release of attack code that exploits a security flaw in a widely used piece of software....
The cyberattacks that took down prominent US and South Korean websites in the last week have apparently ended but the search for those responsible is only just beginning. ....
New electricity meters being rolled out to millions of homes and businesses are riddled with security bugs that could bring down the power grid, according to a security researcher who plans to demonstrate several attacks at a security conference next month ....
Boeing and the Trusted Computing Group demonstrated how the Tofino Industrial Security Solution will be used by Boeing to manage network access and protection for legacy SCADA and control devices.....
Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks....
When you're talking about cybersecurity in the process industries, there are only two issues that matter. The first is how much security you need to be really secure....
Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials....
The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday....
Another Byres company, Byres Research Inc., has merged with exida to form the world’s first company offering functional safety and security certification and consultation.....
In the never-ending quest to save money and boost performance, many organizations are migrating their industrial control systems onto IP networks. As network engineers get to know these new systems, they must tread carefully -- one mistake can lead to disaster....
The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign's iDefense Security Intelligence Services....
The Pentagon has banned, at least temporarily, the use of external computer flash drives because of a virus threat officials detected on Defense Department networks....
Summaries and links to media articles about the announcement of Tofino Security and MTL Instruments introducing the Tofino™ Modbus TCP Enforcer™ Loadable Security Module (LSM)....