By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions. Read more
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more
A number of high-profile social media account hacks demonstrate the importance of secure passwords—and why everyone should enable two-factor authentication on their online accounts. Here's how to do it. Read more
To compete in today’s market driven global economy, businesses opt for control systems that automatically manage processes. ICS enables efficiency, but are connected, heightening threat exposure and corresponding business risks.
Need to know what ransomware is all about? How can ransomware infect your system, or how to prevent ransomware from entering your network? Here are some of the most frequently asked questions on the topic. Read more
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software? Read more
Attackers know that sports enthusiasts are more susceptible during the rush and excitement around major events. Here are a few tips to make sure you enjoy a threat-free experience during the 2016 summer games. Read more