The Future of SCADA/ICS Ransomware
https://medium.com/@DalePeterson/the-future-of-scada-ics-ransomware-e7f94d36c955#.b60oxpj66 ICS are likely to see smarter ransomware and targeted attacks to get it onto ICS PLC’s, RTU’s and controllers. →
https://medium.com/@DalePeterson/the-future-of-scada-ics-ransomware-e7f94d36c955#.b60oxpj66 ICS are likely to see smarter ransomware and targeted attacks to get it onto ICS PLC’s, RTU’s and controllers. →
http://www.computerworld.com.au/article/615338/working-dead-security-risk-dated-linux-kernels/ Outdated Linux kernels with security risks are all around us in various connected devices. →
https://wikileaks.org/ciav7p1/ Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7″ by WikiLeaks project claims that recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. →
http://resources.infosecinstitute.com/top-firewall-differently-populated-enterprises/ What firewalls are recommended for small and big enterprises. One size does not fit all. →
https://opensource.com/business/16/6/shoestring-approach-information-security?sc_cid=7016000000127ECAAY Information security is challenging, and can be breathtakingly expensive in money and staff energy. Smaller organizations may not have the money or staffing expertise to do the job right, even when the need is the greatest. →
https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-february-2017/?es_sh=ae8b87e871c5a4902cd35fea89e40d38&es_ad=80274 →
https://github.com/robertfisk/USG/wiki Check out this firewall for protecting USB port. →
https://www.theregister.co.uk/2017/03/02/aws_s3_crash_result_of_fatfingered_command/ →
http://boingboing.net/2017/02/28/internet-of-shitty-toys.html From article: As I’ve argued before: there is no IoT business model. Hardware starts at a 2% margin and falls from there. IoT companies get capital by promising to monopolize an “ecosystem” — controlling app stores, service, parts, and consumables, and by collecting as much data as possible in case they might get an exit by selling →
https://www.wired.com/2017/02/sky-net-illegal-drone-plan/ This is a long article on public safety challenges drones can cause and ideas how to defeat drone attacks. →