Hacking industrial vehicles from the internet

@tachyeonz : It is possible to monitor and control float trucks, public bus or delivery vans from the internet, obtaining their speed, position, and a lot other parameters. You can even control some parameters of the vehicle or hack into the canbus of the vehicle remotely.

Read More

Connect On:
Twitter :@tachyeonz

Researchers Create Undetectable Rootkit That Targets Industrial Equipment

@tachyeonz : Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world.

Read More

Connect On:
Twitter :@tachyeonz

Some autonomous cars will avoid being hacked by simply staying off the Internet

@tachyeonz : Self-driving cars are essentially large computers on wheels. No surprise, then, that some of them will be kept offline in the name of security.

Read More

Connect On:
Twitter :@tachyeonz

Hackers could explode horribly insecure smart meters, pwn home IoT

@tachyeonz : Smart meters are ‘dangerously insecure’, according to researcher Netanel Rubin, with insecure encryption and known-pwned protocols – and, worryingly, attacks reach all the way to making them explode.

More

Tags : amr, botnets, communication, cyber security, electrical transmission, electrical utilities, hacking, ieee, iiot, infosec, iot, m2m, netanel rubin, powerline, smart grid, smart meters, vaultra, z

Published On:January 04, 2017 at 06:48PM

Connect On:
Medium : http://www.medium.com/iiot
Twitter :@tachyeonz

cPlotting Hackers: Visualizing Attack Patterns

@tachyeonz : I’ve fancied myself more of a command-line application developer for quite a while now — but, recently, I’ve had a lot of fun visualizing data with web applications that can provide interactive tools that can provide new ways to digest and analyze the different information detailed in log

More

Tags : attack logs, awk, bootstrap, charting, cplotting, dashboards, data visualization, dataviz, graphs, grep, imp, infosec, log parser, logs, packets, sinatra ruby, wireshark, z

Published On:January 02, 2017 at 01:12AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

WHAT IS APACHE MILAGRO (incubating)?

@tachyeonz : Apache Milagro (incubating) establishes a new internet security framework purpose-built for cloud-connected app-centric software and IoT devices that require Internet scale.

More

Tags : apache milagro, blockchain, cloud computing, cryptographic platform, cyber security, d-ta, distributed trust, distributed-ta, ecosystems, iiot, infosec, internet of things, iot, m-pin protocol, non proprietary, open source, z, zero password

Published On:December 31, 2016 at 07:51PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Wetwear for Wires

@tachyeonz : The Mr. Robot television series has some real world imitators18 Sep What would Dave and Bill do? Probably not this15 Sep

More

Tags : analytics, artificial intelligence, cyber security, data science, ics, iiot, infosec, iot, machine learning, z

Published On:January 01, 2017 at 10:07AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

SCADA Security: Securing DNP3 Communications with Defense in Depth

@tachyeonz : Two things that make ICS cybersecurity different from IT security are the use of industrial-specific protocols like DNP3 and the common usage of endpoints like PLCs, IEDs and RTUs that are 15+ years old.

More

Tags : control systems, cyber security, cybersecurity, cyberwarfare, cyberweapons, dnp3, exploit, hack, ics, ics tools, iec 61850, infosec, malawares, pentesting, plc, rtu, scada, smart grids, substations, virus, vulnerability, z

Published On:June 16, 2016 at 10:03PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ALGORITHM: The Hacker Movie

@tachyeonz : Get the Blu-ray for $19.99 in the U.S. with free shipping! http://bit.ly/2ikKPjW freelance computer hacker breaks into secret government contractor and downloads a program. He must choose between his own curiosity and the lives of his friends.

More

Tags : algorithms, apt, brute force cracking, cyber security, cyberwarfare, cyberweapons, darknet, hacked, hackers, hacking, infosec, leaked passwords, m, malawares, mitm, movie, password hash cracker, pentest, pentesting, phishing, tailored acces program, tao, videos, virus

Published On:December 30, 2016 at 06:45PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Examining the Vulnerabilities of Industrial Automation Control System

@tachyeonz : This insight paper depicts the real incident of a cyber-attack on a Ukrainian energy distribution company, Ukrainian Kyivoblenergo, to demonstrate how vulnerable Industrial Automation Control System (IACS) are without a clearly defined Supervisory Control and Data Acquisition (SCADA) cyber security

Click here to read more

Tags : analytics, cyber security, ics, iiot, industrial internet, infosec, iot, m

Published On:August 16, 2016 at 10:42PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ForeScout simplifies IoT security

@tachyeonz : Smart lighting, smart meters, smart building systems and other smart endpoints. It seems every device today is a “smart” device. The level of intelligence for the various devices can vary greatly.

Click here to read more

Tags : cyber security, ics, iiot, infosec, iot, m

Published On:August 13, 2016 at 05:31AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ICS-CERT report finds more than 600 IT security weaknesses in US critical infrastructure

@tachyeonz : The trend for connecting critical infrastructure to the internet has led to more than 600 IT security weaknesses being found in industrial control systems (ICS) in critical infrastructure in the US.

Click here to read more

Tags : critical infrastructure, cyber security, hacking, ics, iiot, infosec, iot, m

Published On:August 11, 2016 at 11:06PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz