Why You Should Wear Contacts While on Video Conferences Researchers in Michigan and China have demonstrated their ability to read what is on your screen while you are on a video conference with 75% accuracy with text as small as 10 mm and a relatively low resolution 720 p camera. Credit: The Register Crooks are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
TSA Updates Cybersecurity Guidelines for Pipeline Operators After the Colonial Pipeline meltdown last year, TSA, who regulates pipeline cybersecurity (don’t ask), issued a set of regulations for pipeline operators to follow. Given that TSA had less than a dozen people in their cybersecurity department and zero industrial IoT expertise, it is not a surprise that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When Russian troops stole millions of dollars of John Deere farm equipment from an authorized Deere dealer, Agrotek-Invest, in Melitopol, Ukraine, they trailered them to Checknya, about 700 miles away. What the Russians did not know is that (a) the equipment has a GPS in it, so Deere knew exactly where they took it and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Institute of Standards and Technology (NIST) announced the final version of a special publication focusing on helping manufacturers improve the cybersecurity of their industrial control system (ICS) environments. The guide, titled Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector, is a collaboration between NIST and many […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
State Acknowledges Data Breach After 10 Months I guess better late than never. Finally, the State of Illinois is admitting to a data breach, sort of. Here is what they are now saying. Check the dates below. Notice who was among the last to know – the victims. Can the state be fined for breaking […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month Homeland Security released 4 different advisories for industrial control system vulnerabilities. This comes in the wake of a successful breach of a water treatment plant in Florida. While that hack took advantage of poor cyber hygiene practices (obsolete unpatched software, shared passwords, etc.), it did call attention to the fact that our […]
Continue reading →
[DISPLAY_ACURAX_ICONS]