Researchers Show How Hackers Can Target ICS via Barcode Scanners
Security Week – Hackers previously demonstrated that keystrokes can be remotely injected via an industrial barcode scanner into the computer the scanner is connected to, which could result in the computer getting compromised. IOActive researchers have also been looking at industrial barcode scanners and part of their research, which they described in a blog post, focuses on the scanners used by airport baggage handling systems.
Securing the future of mobility for a post-pandemic world
Intelligent Transport – CAVs especially present a number of security concerns. The increased technology needed to power the vehicle systems can make them more vulnerable to third-party security threats. The potential of such attacks has hit headlines in recent years. A project led by security researchers at Twitter and IOActive saw vehicles remotely hacked through their entertainment systems to reach dashboard functions, steering, brakes and transmission.
IOActive launches Continuous Penetration Testing services
Industrial Cyber – Cybersecurity services provider IOActive announced today the launch of a Continuous Penetration Testing service (CPT). The new CBT service employs an innovative testing method designed to address the challenge of integrating security testing into an agile development model. As many organizations have moved to Continuous Integration and Continuous Deployment (CI/CD) processes the independent validation and verification processes have not aligned with that enhanced agility until now.
CTO Talk: Q&A with IOActive’s Cesar Cerrudo
Verdict – Cesar Cerrudo is the CTO of IOActive, a security research company that approaches security from the attacker’s mindset. The US firm’s team of security consultants work with some of the world’s largest organisations to find flaws in their cyber defences. As CTO, Cerrudo leads a team of ethical hackers that have hijacked technology throughout the stack, including jeeps and robots, and often presents his research at leading cybersecurity conferences such as Black Hat and RSA.
Cybersecurity Threats to the Food Supply Chain
SecurityWeek – Are cyber criminals likely to attack the food industry? The answer is clearly ‘yes’; and there are at least three obvious channels: hacktivists, cyber-criminal gangs, and nation states. “Moving to more significant automation is going to change the risk profile in a way that a lot of organizations haven’t formerly had to manage – operational technology has not been considered a high-risk priority,” commented John Sheehy, Sr. Vice President at IOActive.