Imagine a city the size of London thrown into chaos, as public transport grinds to a halt and traffic lights stop functioning ...This is no longer only the stuff of nightmares or the scenario of a disaster movie but a real possibility that is getting more likely every day. Critical infrastructure facilities, whether power or nuclear plants, national railway and local underground systems or other forms of public transport, are increasingly targeted by cyber attacks. Sophisticated cyber weapons have been developed, including malware designed to disrupt the operation of industrial control systems. The growing use of connected devices in the industrial environment make cyber threats more likely. According to the report Threat Landscape for Industrial Automation Systems, published by cyber security firm Kaspersky Lab, 18 000 different malware modifications to industrial automation systems were detected in the first six months of 2017.
When machines talk to each other...
Machine-to-machine communication is a set of technologies that enables networked devices to interoperate, exchange information or perform actions, often wirelessly and without the manual assistance of humans. Sensors are embedded in a growing number of devices which are utilized to automate and manage process control systems, including transmission and distribution of electricity. While they offer undeniable advantages in terms of cost and maintenance, they are also increasingly vulnerable to hacking.
Cyber security is therefore one....
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR