SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure

Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any nation’s economic health and well-being and are the primary target in any cyber war. These systems include the electrical grid, waster water systems, manufacturing, petrochemical refining, chemical processing and nearly any industrial process. If an adversary […]

Continue Reading

SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)

Welcome back, my aspiring SCADA/ICS cyberwarriors! Let’s begin by congratulating you on your foresight in committing to study SCADA/ICS hacking and security. This is certainly THE most important security issue this decade! In general, SCADA/ICS hacks have been of two types; Hack the protocols (modbus, DNP3, Profitnet, etc); Hack the Human Machine Interface (HMI) In […]

Continue Reading

Why YOU Should Study Software Defined Radio (Signals Intelligence) for Hackers!

Hacking radio signals (RF) IS the leading edge of cybersecurity!    So many applications in our modern life use radio frequency elements that it is hard to list them all. For instance, consider the following list: Automobile and vehicle access and monitoring Mouse and keyboards Cellphone Signals Remote control Telemetry Satellite transmissions Police and military […]

Continue Reading

Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading