June 2012 Cyber Attacks Timeline (Part II)

Part I (1-15 June) at this link From an information security perspective, the second half of June has been characterized

Read more

January 2012 Cyber Attacks Timeline (Part 2)

Click here for part 1. The second half of January is gone, and it is undoubtely clear that this month

Read more

January 2012 Cyber Attacks Timeline (Part 1)

Click here for part 2. New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012

Read more

Browsing Security Predictions for 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions... Read More

Read more

One Year Of Lulz (Part II)

Christmas has just gone and here it is my personal way to wish you a Happy New Year: the second

Read more

December 2011 Cyber Attacks Timeline (Part I)

As usual, here it is my compilation of December Cyber Attacks. It looks like that Christmas approaching is not stopping

Read more

November 2011 Cyber Attacks Timeline (Part II)

The second half of November has confirmed the trend seen in the previous report covering the first half of the

Read more

SCADA Security: Bridge the Gap (Updated)

In the same hours in which I was writing the original article concerning the growing attention of utilities and security vendors versus SCADA security holes; an anonymous hacker put in practice the lesson and broke into wind turbine systems. He was able to break a 200 megawat wind turbine system owned by NextEra Energy Resources, a subsidiary of Florida Power & Light, claiming revenge for an “illegitimate firing”. Having said that it is not yet known whether or not it is an hoax (Wind power company sees no evidence of reported hack), the data was posted to the Full Disclossure security mailing list Saturday anonymously, by someone using the name “Bgr R.” In the post, the author of the hack wrote:... Read More

Read more

SCADA Security: Bridge the Gap

Utilities and Security Vendors are taking very seriously the events of Stuxnet and they’re consequently running for cover. Although due to natural events, the dramatic facts of Fukushima have shown to the entire World (and likely to Cyber-terrorists) how close we are to the abyss of a nuclear meltdown, with the consequent fear that a simil-Stuxnet malware could give the final push (even if according to some urban legends Stuxnet might have played a role in the failure of cooling systems afterward the Tsunami of March 11, 2011).... Read More

Read more

Will Energy Facilities Be The Next Targets Of Cyber-War?

I spent some time in reading the declarations of Comodo Hacker, the alleged author of the fake Certificates issued by mean of the compromising of a couple of (sigh!) Italian Comodo Partners, and I found some very interesting points far beyond the single event.... Read More

Read more
%d bloggers like this: