BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ?
Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns/Overview of ICS Security and Typical deployments ICS devices are used in production of virtually anything. They are used in water/gas/energy/automobile/manufacturing, etc. They are notoriously insecure in many ways. Software […]
Black Hat Europe 2013 – Preview
Hola dear friends, There’s only a few days left until Black Hat Europe 2013 opens its doors in the beautiful city of Amsterdam, the Netherlands. Just like past years, I’ll be covering some of the briefings (semi) live on www.corelan.be. I’ve you’re a speaker – I’ll be the dude in the front row, typing […]