What would happen if your GPS signal were jammed? It would impact more than just navigation – you’d also lose access to financial data and power. Joe Marshall, Senior IoT Strategist and Threat Researcher at…
Error Code Posts
Cybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to violence if they won’t share. Jim Coyle, US Public Sector CTO for Lookout, warns about the increasing use of hacking…
If smart buildings are vulnerable to hacking, what about smart offices? Even devices like printers and lighting systems could give an attacker a way in. John Terrell, CSO at Phosphorus, recalls a moment while working…
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos,…
Political hacktivism once mainly focused on website defacement. Now it has shifted to targeting physical devices, affecting critical infrastructure such as water treatment plants. At Black Hat USA 2024, Noam Moshe from Claroty highlighted how…
What if you could build your own embedded security tools, glitching devices for a fraction of the cost that you might expect. Like having a $150,000 laser setup for less than $500. A talk at…
Too few vulnerabilities in industrial control systems (ICS) are assigned CVEs because of client non-disclosure agreements. This results in repeatedly discovering the same vulnerabilities for different clients, especially in critical infrastructure. Don C. Weber from…
This is a story about how we’ve essentially learned nothing about IOT over the last decade, and why we really need to do more today to help secure our tomorrow. Dan Berte, Director of IoT…
The resources available at small utilities are scarce, and that’s a big problem because small water, gas, and electric facilities are increasingly under attack. Dawn Capelli of Dragos is the Director of OT-CERT, an independent…