Remotely Exploiting Industrial Infrastructure - It's Easy: Black Hat
Page 1 of 1
Industrial control infrastructure that is used to monitor and manage devices and sensors can be remotely exploited, potentially leading to a cataclysmic failure, according to at least two sets of researchers speaking at the Black Hat security conference this week.
Researchers from security firm IOActive detailed their findings in a session provocatively titled "Compromising Industrial Facilities From 40 Miles Away." The industrial automation and control systems (IACS) that IOActive researched use wireless sensors to collect data, explained Lucas Apa, security researcher and consultant at IOActive.