Your one-stop web resource providing safety and security information to manufacturers

Research

DNS Firewalls Could Cut 33% of Breaches: Report

Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33 percent of cybersecurity data breaches from occurring, research from the Global Cyber Alliance (GCA) showed. DNS firewall …

Methane Emissions Much Higher than Stated

Emissions of methane from the industrial sector have been vastly underestimated, with plants reaching 100 times higher than the fertilizer industry’s self-reported estimate, researchers said. Using a Google Street View car equipped with a high-precisio …

Hacking Group Employs Steganography

A highly sophisticated cyberespionage campaign aimed at stealing information from South Asian diplomatic, government and military entities has been around for almost six years and had ties to other recent attacks detected in the region, researchers sai …

Dilemma of Unpatched Vulnerabilities: Report

What percentage of hardware and software assets on your network are discovered automatically?Source: Tripwire survey It is a manufacturer’s dilemma. Yes, there is a vulnerability, but no it can’t be patched because the process needs to keep running. Ho …

Manufacturing has Plethora of Mobile Security Tools

The number of secure access tools in use by sector.Source: IDG Connect on behalf of Pulse Secure The manufacturing Industry ranked mobile security, network access control (NAC) and Software Defined Perimeter (SDP) the tools best suited for a secure acc …

Banking Trojan Attacks Rise in Q1

Kaspersky detected 29,841 installation packages for mobile banking Trojans in the first quarter, almost 11,000 more than in Q4 2018, but less than Q2 and Q3.Source: Kaspersky Lab There has been a significant rise in malware designed to steal credential …

Fear, Anger Conjure Different Breach Reactions

Customers who feel afraid in the wake of a data breach care more about the size and scope of the breach than do angry customers, new research shows. In addition, a company’s stock price can be influenced by the size of the breach when the news coverage …

DDoS Attacks Growing Again: Report

The amount of distributed denial of service (DDoS) attacks during the first three months of 2019 increased by 84 percent, compared with the previous quarter, a new report found. More specifically, there was big growth in the amount of attacks that last …

Misconfigured System an Emerging Threat

It may be hard to think of a misconfigured system as a threat, but it can be the silent killer. To that point, publicly disclosed misconfiguration incidents increased 20 percent year-over-year, a new report found. While there was a rise in incidents, o …

Manufacturing, Energy Targeted Industries

Manufacturing and Energy comprise 16 percent of the most frequently targeted industries.Source: IBM X-Force Manufacturing and energy sectors appear in the top ten of industries most targeted by attackers, a new report found. The fifth-most targeted ind …

Manufacturing BEC Victims: Report

Top five targeted industries.Source: Palo Alto Networks Unit 42 Business Email Compromise (BEC) schemes continue to remain one of the most profitable and widespread activities among cyber criminals and the manufacturing sector is one of the growing are …

C-Suite a Big Attack Target: Report

It should be no surprise, but C-level executives are under attack. It only makes sense since he or she have access to a company’s most sensitive information, which means the executives are now the major focus for social engineering attacks, according t …

Manufacturing Report: Financial Attacks on Rise

Source: 2019 Verizon Data Breach Investigations Report By Gregory Hale Cyber attacks in the manufacturing industry continue to grow and it appears financially motivated assaults outnumber cyber-espionage as the main reason for breaches for the second y …

Flaws in ‘Smart Home’ IoT Devices

There are design flaws in “smart home” Internet-of-Things (IoT) devices that allow third parties to prevent devices from sharing information. These flaws can be used to prevent security systems from signaling that there has been a break-in or uploading …

Blockchain Exploitable by Bots

Blockchains have been hailed as fair and open, constructed so a single user can’t falsify or alter records because they’re all part of a transparent network. The reality is not so simple, new research shows. RELATED STORIES Blockchain to Halt Counterfe …

Sensitive Data Files Remain Exposed: Report

With increased connectivity continuing to grow for manufacturers, data protection is becoming more vital, but it appears over half the companies have over 1,000 sensitive files exposed to all employees, a new report found. With sensitive information av …

Cyber Stress Continues to Grow: Report

Cybersecurity woes not only keep professionals up at night, but, apparently, it worries a great deal of people in the U.S. and Canada, a new report found. Along those lines, 75 percent of people in the U.S. and Canada are stressed by the number of pass …

Cyber Crime Tops $2.7B in ‘18

“A victim can be anyone who uses a connected device.” That was a line from Donna Gregory, chief of the FBI’s Internet Crime Complaint Center (IC3) in a report the agency just released on statistics gathered or 2018 that show Internet-enabled theft, fra …

Deepwater Horizon Spill’s Lingering Effects

Dr. Sean Graham of Nicholls State (L) prepares to sample the marsh soil within a Louisiana salt marsh as his students work in the background.Source: D. Johnson/VIMS It has been nine years and while there are some experts saying the environmental impact …

Cyber Incident Response Plans Lacking: Report

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, a new report found. Seventy-seven percent of respondents indicated they do not have a cybersecurity incident response plan applied consistently across …

Pin It on Pinterest