Dale Peterson and Digital Bond are typically in two to three articles per week as one of the leading voices in ICS and SCADA security. This page links to some of the articles that we thought best reflected our activities and point of view.
- PCAdvisor: Security Firm Showcases Vulnerabilities in SCADA Software – Won’t Report Them To Vendors (accurate quotes and explanation of Digital Bond’s position on disclosure)
- Wired: Researchers Release New Exploits To Hijack Critical Infrastructure (another bad headline but good article on Project Basecamp Camp III)
- Embedded.com: Not in Kansas Anymore – Securing SCADA
- ThreatPost: Bloody Valentine for Critical Infrastructure (Project Basecamp Camp II)
- Wired: Hoping to Teach a Lesson, Researchers Release Exploits for Critical Infrastructure Software (bad headline, but accurate article on Project Basecamp release at S4)
- ThreatPost: Looking for a Firesheep Moment, Researchers Lay Bare Woeful SCADA Security
- ThreatPost: Slideshow: scenes from S4
- Infosec Island: Hacking PLC’s as Easy as Pushing a Button
Of course all these links and videos are in Japanese. Digital Bond will be starting a Japanese site on 2 January 2013.
- Softbank Covers Dale Peterson’s IPA Forum Presentation – 9 November
- NHK’s Close Up Gendai – 28 June
Close Up Gendai is a very popular, long-format daily news magazine on NHK in Japan. Dale Peterson and Reid Wightman appeared to discuss the PLC insecure by design issues and demonstrate this with the vulnerabilities in Japanese vendor Koyo’s products. The link takes you to an 8-minute excerpt from the 30-minute story.
- Yomiuri Shimbun’s U.S. firm posts PLC hacking methods online / Koyo Electronics listed as one of four manufacturers whose systems are susceptible to cyber-attacks - 29 February (English)
This was available in Japanese in hard copy, but not on their web site.
- CRWE Newswire – How to Attack PLC’s / Koyo Electronics
- Nikkan Koygo Editorial – Fragility of Japan’s Information Systems
- JCast Opinion Piece - Train hijack destruction, nuclear, water, a central enterprise – which is aimed at the Japanese large-scale cyber attack