Protecting Against Critical Infrastructure Attacks: Nuclear & Otherwise
The Nuclear Regulatory Commission (NRC) was the target of three separate breaches, according to DarkReading.com and NextGov.com.
The latest information security news - what's happening now, what's important, why it matters, real-world implications and who it matters to - without any of the overhype.
427 Articles Found
The Nuclear Regulatory Commission (NRC) was the target of three separate breaches, according to DarkReading.com and NextGov.com.
According to an analyst at CERT/CC’s Vulnerability Notes Database, certain Netgear switches contain hard-coded passwords that can allow a remote attacker to authenticate to the web server running on the device.
> When it comes to the 2014 Verizon Data Breach Investigations Report (DBIR), web application, cyber-espionage and POS intrusions topped off the list of most frequently occurring categories of data breaches.
Breaches of card data and point of sale systems often involve remote access management tools, as attackers scan for remote administration software, then use automated tools to break into weakly protected systems.
According to the IBM Security Services 2014 Cyber Security Intelligence Index, over 95 percent of all incidents investigated recognize human error as a contributing factor.