Extracting data from closely-protected SCADA and ICS critical networks

A piece of malware can transform a Siemens industrial controller into a radio that transmits sensitive data from critical infrastructure. [...] (403 words)
Issue dated 13/12/2017 Reading time 2 minutes

Read this article here:

Further reading
On our other sites

Sign up for real-time alerts and be notified of new editions!  

Once registered, you will be notified by a short message on your computer or mobile phone as soon as a new edition of our publication or an alert is published. Stay informed anytime, anywhere!