The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car were the subject of movie scenes. Today they are a disturbing reality that we discuss in this article.
One of the […]
Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure. They’re considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats […]
The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access […]
The article will explore various strategies for reversing firmware, with some examples. Finally, some best practices are mentioned.
Embedded Systems and Firmware
Embedded systems are everywhere, in mobiles, cameras, TVs, smart cards, and other automated devices. They have become an integral part of our lives and have made it comfortable and […]
In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an event considered by principal security experts extremely likely.
Probably the strongest jolt has been caused by events such as the spread […]
As the world becomes increasingly digitized, IT security impacts more and more of our lives. Most ordinary citizens are unaware of how our important civic services- electricity, public transportation and water, not just telecommunications- are now dependent on computing and networking technologies.
Many industrial utilities are operated with SCADA, supervisory […]
Last week, the New York Times scooped a story that the Obama administration “intensely debated” plans to use cyber warfare as part of the March 2011 military intervention in Libya and in the May 2011 operation in Pakistan that led to the death of Osama Bin Laden. The tactics […]
In our ongoing series of interviews, we got HD Moore to answer a few questions and pull back the curtain a bit on the methods, tools and motivation for the research he does discovering security exploits.
HD Moore is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the […]
In the videos below, Joel Langill deconstructs each part of the worm to show it in action. In the second video you’ll see the best practices that InfoSec Institute uses (we have a training course dedicated to SCADA control systems which includes a robust Stuxnet lab) to mitigate this […]