Power, infrastructure, factory gear can be hijacked without any password check at all Just a reminder: We're still bad at securing industrial controllers
Industrial control software vulnerabilities, which would be perfect for next-gen Stuxnet-style worms to exploit, are as prevalent as ever, apparently. A report out this week from Tenable outlined a series of CVE-listed security holes in the products of four of the largest industrial control system (ICS) makers, including Siemens, whose controllers at Iranian nuclear enrichment plants were the primary target of Stuxnet. Developed chiefly by America and Israel, Stuxnet worked by infecting Windows ...