Your one-stop web resource providing safety and security information to manufacturers

Research

Hacking Group Employs Steganography

A highly sophisticated cyberespionage campaign aimed at stealing information from South Asian diplomatic, government and military entities has been around for almost six years and had ties to other recent attacks detected in the region, researchers sai …

Dilemma of Unpatched Vulnerabilities: Report

What percentage of hardware and software assets on your network are discovered automatically?Source: Tripwire survey It is a manufacturer’s dilemma. Yes, there is a vulnerability, but no it can’t be patched because the process needs to keep running. Ho …

IoT Attack Losses at $330K and Rising

Organizations in industries like manufacturing have suffered substantial losses due to IoT-related vulnerabilities, a new study found. In addition, 8 out of 10 organizations experienced a cyberattack on their IoT devices in the past 12 months, accordin …

Manufacturing has Plethora of Mobile Security Tools

The number of secure access tools in use by sector.Source: IDG Connect on behalf of Pulse Secure The manufacturing Industry ranked mobile security, network access control (NAC) and Software Defined Perimeter (SDP) the tools best suited for a secure acc …

Banking Trojan Attacks Rise in Q1

Kaspersky detected 29,841 installation packages for mobile banking Trojans in the first quarter, almost 11,000 more than in Q4 2018, but less than Q2 and Q3.Source: Kaspersky Lab There has been a significant rise in malware designed to steal credential …

Fear, Anger Conjure Different Breach Reactions

Customers who feel afraid in the wake of a data breach care more about the size and scope of the breach than do angry customers, new research shows. In addition, a company’s stock price can be influenced by the size of the breach when the news coverage …

DDoS Attacks Growing Again: Report

The amount of distributed denial of service (DDoS) attacks during the first three months of 2019 increased by 84 percent, compared with the previous quarter, a new report found. More specifically, there was big growth in the amount of attacks that last …

Misconfigured System an Emerging Threat

It may be hard to think of a misconfigured system as a threat, but it can be the silent killer. To that point, publicly disclosed misconfiguration incidents increased 20 percent year-over-year, a new report found. While there was a rise in incidents, o …

Manufacturing, Energy Targeted Industries

Manufacturing and Energy comprise 16 percent of the most frequently targeted industries.Source: IBM X-Force Manufacturing and energy sectors appear in the top ten of industries most targeted by attackers, a new report found. The fifth-most targeted ind …

Analytics for Improved Machinery Reliability

PeakVue Plus, shown on the AMS 2140 Machinery Health Analyzer, brings prescriptive analytics to the field to help users improve availability of rotating machinery. Emerson released PeakVue Plus, a technology that brings prescriptive analytics to the fi …

Manufacturing BEC Victims: Report

Top five targeted industries.Source: Palo Alto Networks Unit 42 Business Email Compromise (BEC) schemes continue to remain one of the most profitable and widespread activities among cyber criminals and the manufacturing sector is one of the growing are …

C-Suite a Big Attack Target: Report

It should be no surprise, but C-level executives are under attack. It only makes sense since he or she have access to a company’s most sensitive information, which means the executives are now the major focus for social engineering attacks, according t …

Manufacturing Report: Financial Attacks on Rise

Source: 2019 Verizon Data Breach Investigations Report By Gregory Hale Cyber attacks in the manufacturing industry continue to grow and it appears financially motivated assaults outnumber cyber-espionage as the main reason for breaches for the second y …

Flaws in ‘Smart Home’ IoT Devices

There are design flaws in “smart home” Internet-of-Things (IoT) devices that allow third parties to prevent devices from sharing information. These flaws can be used to prevent security systems from signaling that there has been a break-in or uploading …

Blockchain Exploitable by Bots

Blockchains have been hailed as fair and open, constructed so a single user can’t falsify or alter records because they’re all part of a transparent network. The reality is not so simple, new research shows. RELATED STORIES Blockchain to Halt Counterfe …

Sensitive Data Files Remain Exposed: Report

With increased connectivity continuing to grow for manufacturers, data protection is becoming more vital, but it appears over half the companies have over 1,000 sensitive files exposed to all employees, a new report found. With sensitive information av …

Cyber Stress Continues to Grow: Report

Cybersecurity woes not only keep professionals up at night, but, apparently, it worries a great deal of people in the U.S. and Canada, a new report found. Along those lines, 75 percent of people in the U.S. and Canada are stressed by the number of pass …

Cyber Crime Tops $2.7B in ‘18

“A victim can be anyone who uses a connected device.” That was a line from Donna Gregory, chief of the FBI’s Internet Crime Complaint Center (IC3) in a report the agency just released on statistics gathered or 2018 that show Internet-enabled theft, fra …

Deepwater Horizon Spill’s Lingering Effects

Dr. Sean Graham of Nicholls State (L) prepares to sample the marsh soil within a Louisiana salt marsh as his students work in the background.Source: D. Johnson/VIMS It has been nine years and while there are some experts saying the environmental impact …

‘Sea Turtle’ Targets Energy Firms

New threat campaign called “Sea Turtle” is targeting public and private entities, including energy organizations, primarily in the Middle East and North Africa. However, there is concern with the success of this operation, it will lead to attackers bro …

Pin It on Pinterest