Duqu

Dragonfly Malware Targets ICS Systems

The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Since that shock, we have seen advanced malware, such as Flame and Duqu, target energy companies for espionage purposes.

Flame Malware and SCADA Security: What are the Impacts?

Over the weekend a new super worm exploded onto the cyber security landscape. Known as Flame or sKyWIper, it appears to be targeting sites in the Middle East, just like the Stuxnet and Duqu worms did. But what does it have to do with SCADA or ICS security? At this stage the answer appears to be nothing and…everything.

Air Gaps won’t Stop Stuxnet’s Children

As someone working in the field of industrial cyber security I never thought I would see the day when a cyber attack would be the topic of a prime time television show.

7 Steps to ICS and SCADA Security plus White Paper

Last year I published two articles titled “Getting Started on ICS and SCADA Security” (Part 1 and Part 2).  As a result of their popularity, I have worked with John Cusimano of exida to develop the material further.  The result is the white paper that we are releasing today titled “7 Steps to ICS and SCADA Security”.  This ar

Factory of the Future meets Stuxnet’s Children: Egad!

Late last year Frost and Sullivan, an international analyst group, released a short report called Current Scenario and Future Landscape in the Automation & Control Systems (ACS) Market.” The report claims that “the field of industrial automation is at a cross roads,” due to “narrowing product definition between individual ACS products, specifically the PLC and DCS product line.”

SCADA Security 2012 Crystal Ball

The Oscar season is upon us and instead of predicting who will win Academy Awards I am writing today to talk about what I see in my “Crystal Ball” for 2012.

Subscribe to RSS - Duqu