The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car were the subject of movie scenes. Today they are a disturbing reality that we discuss in this article.
One of the […]
Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure. They’re considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats […]
The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access […]
The article will explore various strategies for reversing firmware, with some examples. Finally, some best practices are mentioned.
Embedded Systems and Firmware
Embedded systems are everywhere, in mobiles, cameras, TVs, smart cards, and other automated devices. They have become an integral part of our lives and have made it comfortable and […]
In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an event considered by principal security experts extremely likely.
Probably the strongest jolt has been caused by events such as the spread […]
In the videos below, Joel Langill deconstructs each part of the worm to show it in action. In the second video you’ll see the best practices that InfoSec Institute uses (we have a training course dedicated to SCADA control systems which includes a robust Stuxnet lab) to mitigate this […]