Remotely Exploiting Industrial Infrastructure – It’s Easy: Black Hat

Industrial control infrastructure that is used to monitor and manage devices and sensors can be remotely exploited, potentially leading to a cataclysmic failure, according to at least two sets of researchers speaking at the Black Hat security conference this week.

Researchers from security firm IOActive detailed their findings in a session provocatively titled “Compromising Industrial Facilities From 40 Miles Away.” The industrial automation and control systems (IACS) that IOActive researched use wireless sensors to collect data, explained Lucas Apa, security researcher and consultant at IOActive.

Read the full story at eWeek:
Industrial Infrastructure Vulnerable to Remote Tampering: Black Hat

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist.

Get the Free Newsletter!

Subscribe to our newsletter.

Subscribe to Daily Tech Insider for top news, trends & analysis

News Around the Web