The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering.
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from far away. This time, we look at what that means for nuclear plants, HVAC, manufacturers and other industries still using pagers.
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI.
An enterprise guide on network segmentation; how it works to secure large enterprise networks, why it's needed, and examples of some of the most widely used network models for different industries.
By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.