Forgot your password?
typodupeerror
Bug Security IT

Researcher Finds Nearly Two Dozen SCADA Bugs In a Few Hours 104

Posted by samzenpus
from the target-rich-environment dept.
Trailrunner7 writes "It is open season on SCADA software right now. Last week, researchers at ReVuln, an Italian security firm, released a video showing off a number of zero-day vulnerabilities in SCADA applications from manufacturers such as Siemens, GE and Schneider Electric. And now a researcher at Exodus Intelligence says he has discovered more than 20 flaws in SCADA packages from some of the same vendors and other manufacturers, all after just a few hours' work."
This discussion has been archived. No new comments can be posted.

Researcher Finds Nearly Two Dozen SCADA Bugs In a Few Hours

Comments Filter:
  • by RobbieCrash (834439) * on Monday November 26, 2012 @05:41PM (#42099399)

    Where's the lazy editing? It's not like this is the first SCADA story on /.. Are we going to start defining every non-everyday term in a summary?

    "Researchers have identified a hole (an overlooked security concern) in the TCP (Transmission Control Protocol a system of information transmission that aids in reliable data transfer) layer (a metaphorical layer in a sandwich of other layers each of which pertain to certain elements of the network stack (the combination of hardware (physical parts of a computer) and software (the computer code that resides on a computer's storage that makes up a computer program) that allow a computer to /talk/ to another computer over a network)) of Windows (a computer operating system (a complex computer program that coordinates and translates software requests into hardware actions))."

  • by Trepidity (597) <delirium-slashdot@@@hackish...org> on Monday November 26, 2012 @06:33PM (#42099901)

    Glad to see another Extraterrestrial Life researcher on Slashdot!

"The whole problem with the world is that fools and fanatics are always so certain of themselves, but wiser people so full of doubts." -- Bertrand Russell

Working...