Hackers Humiliate Putin Prominent Media Vandalized On Russian Holiday. Rachel Maddow reports on hackers defacing Russia’s TV schedule grid with an antiwar message.
Continue ReadingInfrastructure
How SpaceX Could Win The Space Race
The SpaceX broadband satellite internet, Starlink, is expected to be a cash cow for SpaceX, bringing in as much as $30 billion a year.
Continue ReadingHacking Power Plants and Scada ICS
Hacking interview with the professional hacker Occupy The Web. This video discusses OSINT and hacking industrial control systems (ICS) using SCADA (supervisory control and data acquisition)
Continue ReadingCyber Terrorists Wreaking Havoc
The world is at war with Cyber Terrorists wreaking havoc and costing billions of dollars.
Continue ReadingHow a Cyber Attack Crippled The Colonial Pipeline
The Colonial Pipeline cyber attack caused a major blow to the gasoline industry in the southern and eastern parts of the United States.
Continue ReadingRussian cyberattack worse than initially thought
Microsoft’s CEO shared just how extensive the cyberattack was and that he believes it is ongoing.
Continue ReadingLarge scale cyber attack on Australian institutions and companies
This cyber attack is targeting Australian organizations across a range of sectors.
Continue ReadingIndustrial Control Systems ICS-CERT Alerts
Industrial Control Systems ICS-CERT Alerts
Continue ReadingSmart Cities on TechRepublic
Smart Cities on TechRepublic News, Tips, and Advice for Technology Professionals.
Continue ReadingMcAfee Advanced Threat Research Delta EnteliBUS Manager Vulnerability Demo
The McAfee Advanced Threat Research team discovered a zero-day vulnerability in the Delta Controls enteliBUS Manager
Continue ReadingMcAfee Advanced Threat Research Demo Chamberlain MyQ
This video demonstrates advanced threat research and how an attacker could jam radio frequency signals to manipulate the state of a connected garage door.
Continue ReadingMcAfee Advanced Threat Research Demo McLear NFC Ring
This video demonstrates advanced threat research and how an attacker could clone a NFC Ring used to interact with NFC enabled door locks, and potentially gain access to a consumer home.
Continue ReadingInfrastructure Electric,Gas & Water
Infrastructure Electric,Gas & Water From terrorism to vandalism, it’s preparedness, response, training and partnerships.
Continue Reading