Full Disclosure mailing list archives
Lexis search for "scada + hackers" 1996-2010 -- 544 citations
From: Shawn Merdinger <shawnmer () gmail com>
Date: Sat, 23 Oct 2010 23:27:50 -0400
Hi List, Below are the citations from the results of a Lexis-Nexis (Academic Universe) search for keywords SCADA and HACKER going back to 1996. For copyright reasons I cannot provide full documents, but you can go to a college library, do the same search and pull the full-text. I was going to cull through the full-text and write a compendium of quotations/warnings/call-to-action starting from 1996, but I've not the bandwidth at the moment. Perhaps someone else will. Cheers, --scm 1. PREPARED STATEMENT BY JOHN H. DEUTCH DIRECTOR OF CENTRAL INTELLIGENCE BEFORE THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE SUBCOMMITTEE ON INVESTIGATIONS "FOREIGN INFORMATION WARFARE PROGRAMS AND CAPABILITIES" Federal News Service, JUNE 25, 1996, TUESDAY, IN THE NEWS, 2000 words 2. TESTIMONY June 25, 1996 JOHN M. DEUTCH DIRECTOR CENTRAL INTELLIGENCE AGENCE SENATE GOVERNMENT AFFAIRS PERMANENT SUBCOMMITTEE ON INVESTIGATIONS COMPUTER SECURITY Federal Document Clearing House Congressional Testimony, June 25, 1996, Tuesday, CAPITOL HILL HEARING TESTIMONY, 2042 words 3. TELECOMMUNICATION, COMPUTER SYSTEMS VULNERABLE TO TERRORISM Radio Comm. Report, July 08, 1996, News; Pg. 5, 627 words, Jeffrey Silva 4. A little knowledge can be a dangerous thing Energy IT, UPFRONT; Vol. 3, No. 2; Pg. 6, 501 words 5. PREPARED STATEMENT OF JANT RENO UNITED STATES ATTORNEY GENERAL BEFORE THE SENATE APPROPRIATIONS COMMITTEE COMMERCE, JUSTICE, STATE AND JUDICIARY SUBCOMMITTEE Federal News Service, MARCH 31, 1998, TUESDAY, IN THE NEWS, 10371 words 6. The U.S. power grid isn't hacker-friendly The Washington Times, April 22, 1998, Wednesday, Final Edition, Part A; COMMENTARY; EDITORIALS; LETTERS; Pg. A18, 415 words 7. Letters to the Editor ; This month: Bryan Morgan's call for suggestions (in the debut installment of his new Distributed Objects column) hasn't gone unnoticed. He sifts through the deluge to shape his column's itinerary for the next six months. Plus: Corrections and amendments to Carl Dichter's Java visual IDEs review; more on those JVM server benchmarks; praise for Laurence Vanhelsuw and Chuck McManis; and two major (and related) design headaches for Bill Venners JavaWorld, May 1998, 3544 words 8. DELIVERS REMARKS AT FORTUNE 500 CIO FORUM; ASPEN, CO FDCH Political Transcripts, August 12, 1998, Wednesday, 4681 words 9. U.S. DOD DoD news briefing M2 PRESSWIRE, August 13, 1998, 4594 words 10. Plant managers focus on growth strategies Power, September, 1998, /October, 1998, CONFERENCE REPORT; POWER'S Seventh Annual Powerplant O&M Symposium; Vol. 142, No. 5; Pg. 42, 2186 words, Compiled by Allen Kopp, Contributing Writer 11. New Products, Access Control & Security Systems Integration, November 1998, New Products; ISSN: 1084-6425 , 2072 words, AC&SSI Staff 12. WHEN GOTHAM GOES DARK:TERRORISM'S TAKING ON A NEW FACE FOR THE COMPUTER AGE The New York Post, November 18, 1999, Thursday, 830 words, Bob McManus 13. Thin clients simplify maintenance, lower total cost of ownership Instrumentation & Control Systems, December 1999, Pg. 67-68, 1587 words, Hancock, David 14. The next Y2K? Energy IT, SECURITY; Vol. 5, No. 1; Pg. 12, 2025 words, By Ray Pospisil; Ray Pospisil is a freelance writer based in Brooklyn, NY, and a regular contributor to McGraw-Hill Energy publications. 15. EPRI SAYS OPEN-PLATFORM SYSTEMS COULD CAUSE HACKER VULNERABILITY Electric Utility Week (formerly Electrical Week), March 13, 2000, TECHNOLOGY; Pg. 17, 453 words 16. CYBER WAR; WEAKNESS OF MILITARY AND CIVILIAN COMPUTER SYSTEMS IN THE UNITED STATES AGAINST OUTSIDE COMPUTER HACKERS CBS News Transcripts, 2564 words 17. Energy infrastructure security Electrical Business, May, 2000, Pg. v.36(5) My'00 pg 24, 812 words 18. Five top IT applications in power delivery Electrical World, November, 2000, /December, 2000, SPECIAL SECTION; Vol. 214, No. 6; Pg. 12, 2553 words 19. What you don't know, will hurt you Electric Light & Power, December, 2000, COMMENTARY; Pg. 3, 702 words, Pam Boschee 20. The importance of infrastructure in a digital world; FEATURES - COVER STORY The Age (Melbourne, Australia), January 23, 2001 Tuesday, COMPUTERS; It Professional; Pg. 1, 2085 words, SUE CANT 21. U.S. SENATOR JUDD GREGG (R-NH) HOLDS HEARING ON TERRORISM AND U.S. GOVERNMENT CAPABILITIES (AFTERNOON SESSION) FDCH Political Transcripts, May 8, 2001, Tuesday, 22753 words 22. California hack points to possible IT surveillance threat InfoWorld Daily News, June 13, 2001, Wednesday, 862 words, By Dan Verton, Computerworld, InfoWorld.com 23. California Hack Points to Possible Surveillance Threat; Power grid unaffected; perps unidentified Computerworld, June 18, 2001, NEWS - EARLY; Pg. 17, 628 words 24. Information Security for T&D Automation, Transmission & Distribution World, July 2001, INFOCUS; ISSN: 1087-0849, 1180 words, Joe Weiss 25. Telecom technologies boost utility operations Energy IT, COMMUNICATIONS; Vol. 6, No. 4; Pg. 51, 3825 words, By Frank E. Benassi 26. VIRTUAL PROBLEMS Foreign Affairs, September, 2001 / October, 2001, LETTERS TO THE EDITOR; Pg. 180, 442 words, RALPH HITCHENS; U.S. Department of Energy 27. B2B creates securITy challenges Energy IT, DATA SECURITY; Vol. 6, No. 5; Pg. 45, 4288 words, By Frank E. Benassi 28. PREPARED STATEMENT OF RONALD L. DICK DEPUTY ASSISTANT DIRECTOR, COUNTER TERRORISM DIVISION, AND DIRECTOR, NATIONAL INFRASTRUCTURE PROTECTION CENTER, FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOUSE COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE SUBCOMMITTEE ON WATER RESOURCES AND ENVIRONMENT SUBJECT - TERRORISM: ARE AMERICA'S WATER RESOURCES AND ENVIRONMENT AT RISK Federal News Service, October 10, 2001, Wednesday, PREPARED TESTIMONY, 5997 words 29. TERRORIST RISK TO WATER AND ENVIRONMENT Federal Document Clearing House Congressional Testimony, October 10, 2001, Wednesday, CAPITOL HILL HEARING TESTIMONY, 6063 words 30. Energy Firms Stand Guard Amid Threats InternetWeek, November 19, 2001 Monday, NEWS & ANALYSIS; Pg. 1, 776 words, Rutrell Yasin 31. The State Journal-Register (Springfield, IL), December 8, 2001 Saturday, LOCAL; Pg. 9, 2429 words 32. Locking down on system security, American City & County, January 2002, WATERSUPPLY; ISSN: 0149-337X, 2871 words, Beth Wade, Managing Editor 33. Protecting critical infrastructures by sharing information Energy IT, SECURITY; Vol. 7, No. 1; Pg. 45, 985 words, Willard S. Evans, Jr. is vice president of Information Technology Services at Peoples Energy Corp., Chicago. He is one of the 11 members of the Energy/ISAC's Board of Managers.; By Willard S. Evans, Jr. 34. Companies on the prowl for IT security Electric Light & Power, February, 2002, Pg. 1, 1672 words, Dana Bacciocco, Associate Editor, Walls is associate director of advanced energy systems with Arthur D. Little Inc. He can be reached directly via telephone (617-498-6649) or e-mail (walls.d () adl com). 35. How one hacker penetrated a utility network: A true story Energy IT, DATA SECURITY; Vol. 7, No. 2; Pg. 46, 1183 words 36. Digital Terrorism: Holes in the Firewall? Plugging cyber security holes isn't as easy as everyone wants to think. PUBLIC UTILITIES FORTNIGHTLY, March 15, 2002, ARTICLE; Pg. 12, 4886 words, By Jennifer Alvey; Jennifer Alvey is associate editor at Public Utilities Fortnightly. 37. The Truth About Cyberterrorism CIO Magazine, March 15, 2002, FEATURE, 2821 words, Scott Berinato 38. DIGITAL NIGHTMARE Governing Magazine, April, 2002, FEATURE;Pg. 20, 2840 words, Ellen Perlman 39. CSIS warns infrastructure vulnerable to cyberterrorism Cobourg Daily Star (Ontario), May 8, 2002 Wednesday, NATIONAL NEWS; Pg. 19, 561 words, Southam News 40. CSIS warns infrastructure vulnerable to cyberterrorism Port Hope Evening Guide (Ontario), May 8, 2002 Wednesday, NATIONAL NEWS; Pg. 19, 561 words, Southam News 41. HEARING OF THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE SUBJECT: SECURING OUR INFRASTRUCTURE: PRIVATE/PUBLIC INFORMATION SHARING CHAIRED BY: SENATOR JOSEPH LIEBERMAN (D-CT) LOCATION: HOUSE/SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, May 8, 2002 Wednesday, CAPITOL HILL HEARING, 27430 words 42. U.S. Fears Al Qaeda Cyber Attacks Newsbytes, 3398 words, Barton Gellman; Washington Post Staff Writer 43. Related Documents and Resources On The Web Newsbytes, 187 words, Compiled by The Washington Post and washingtonpostcomTechNewscom 44. Cyber-Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say The Washington Post, June 27, 2002 Thursday Correction Appended, A SECTION; Pg. A01, 3409 words, Barton Gellman, Washington Post Staff Writer 45. Al-Qaida hackers targeting Bay Area Tri-Valley Herald (Pleasanton, CA), June 27, 2002 Thursday, HEADLINE NEWS, 1239 words, By Barton Gellman, Washington Post 46. Bay Area probed for attack; FBI: Al-Qaida has cased computer systems Alameda Times-Star (Alameda, CA), June 27, 2002 Thursday, HEADLINE NEWS, 1226 words, By Barton Gellman , Washington Post 47. Bay Area probed for attack; FBI: Al-Qaida has cased computer systems The Oakland Tribune (Oakland, CA), June 27, 2002 Thursday, HEADLINE STORIES, 1226 words, By Barton Gellman , Washington Post 48. Al-Qaida casing Bay Area networks; FBI: Cyberterrorists The Daily Review (Hayward, CA), June 27, 2002 Thursday, HEADLINE NEWS, 1240 words, By Barton Gellman, Washington Post 49. Al-Qaida Internet threat revealed; State infrastructure, disruption of communications were targets San Mateo County Times (San Mateo, CA), June 27, 2002 Thursday, FRONT PAGE, 1703 words, By Barton Gellman, Washington Post 50. 4 cities shield Web data San Jose Mercury News (California), June 28, 2002 Friday PS1 EDITION, B; Pg. 1, 893 words, Sean Webby Mercury News 51. Four Bay Area cities sanitized Web sites; SUSPICIOUS TRAFFIC LED TO REMOVAL OF DATA San Jose Mercury News (California), June 28, 2002 Friday F1 EDITION, B; Pg. 1, 701 words, Sean Webby Mercury News 52. 4 cities take data off Web; AUTHORITIES REMOVE INFO AFTER HITS FROM MIDEAST San Jose Mercury News (California), June 28, 2002 Friday MO1 EDITION, B; Pg. 1, 665 words, Sean Webby Mercury News 53. Four Bay Area cities reported suspicious traffic on Web sites; TERROR CONCERN: HITS INVOLVED 911 CENTERS, POWER, WATER SUPPLIES; SENSITIVE DATA REMOVED San Jose Mercury News (California), June 28, 2002 Friday A1 EDITION, B; Pg. 1, 777 words, Sean Webby Mercury News 54. Suspicious traffic led to removal of data on Bay Area cities' Web sites San Jose Mercury News, June 29, 2002, Saturday, STATE AND REGIONAL NEWS, 727 words, By Sean Webby 55. Securing supervisory control and data acquisition systems Hydrocarbon Processing, July 2002 , 1832 words 56. Despite gains, U.S. remains vulnerable to terrorist hackers, White House aide says Gannett News Service, July 18, 2002, Thursday, 532 words, GREG WRIGHT; Gannett News Service 57. CYBERTERRORISM Federal Document Clearing House Congressional Testimony, July 24, 2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2808 words 58. CYBERTERRORISM Federal Document Clearing House Congressional Testimony, July 24, 2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2724 words 59. U.S. REPRESENTATIVE STEPHEN HORN (R-CA) HOLDS HEARING ON CYBERTERRORISM AND CRITICAL INFRASTRUCTURE FDCH Political Transcripts, July 24, 2002 Wednesday, 25774 words 60. NeoNET, Inc. Announces Security Services Business Wire, July 26, 2002, Friday, 291 words 61. Hackers and Tall Tales The Washington Post, August 2, 2002 Friday, EDITORIAL; Pg. A22, 192 words 62. Cybersecurity Gains Momentum Chemical Week, August 21, 2002, E-COMMERCE; Pg. 42, 1928 words, ESTHER D'AMICO 63. NeoNET's Free ''Over-the-Wire'' Vulnerability Test Answers ''Yes'' or ''No'' Business Wire, August 28, 2002, Wednesday, 438 words 64. Control systems: The weak link in infrastructure protection Platts Energy Business & Technology, September, 2002, CYBER SECURITY; Vol. 4, No. 5; Pg. 35, 1154 words, BY JOSEPH M. WEISS, P.E., AND DR. GERALD J. FITZPATRICK; Joseph M. Weiss, P.E., is an executive consultant with KEMA Consulting, Fairfax, Va. (jweiss () kemaconsulting com). Dr. Gerald J. FitzPatrick is leader of the Electric Systems Group at the National Institute of Standards and Technology (NIST), Gaithersburg, Md. (fitzpa () nist gov). 65. Preparing for the worst Platts Energy Business & Technology, September, 2002, BUSINESS SECURITY; Vol. 4, No. 5; Pg. 37, 1729 words, Tina M. Sivinski is Vice President and Energy Global Industry Solutions President of EDS, Plano, Tex.; BY TINA M. SIVINSKI 66. Cyber Terror Lurks As Potential Threat; Could Do Serious Harm; Financial services and utilities among sectors that could be damaged Investor's Business Daily, September 11, 2002 Wednesday, INTERNET & TECHNOLOGY; NATIONAL, 847 words, BY DONNA HOWELL 67. White House Issues Cyber Security Plan; Containing threats requires cooperation from all sectors, plan recommends State Department, September 20, 2002, NEWS FROM THE WASHINGTON FILE, 4596 words 68. Bush team lays out cybersecurity plan; Recommendations draw praise, but some question whether they go far enough. Network World, September 23, 2002, FRONT NEWS; Pg. 10, 895 words, ?BY CAROLYN DUFFY MARSAN AND ELLEN MESSMER 69. Critical Infrastructure Security and You -- You don't have to be a utility to apply some of the same network safeguards they use. Network Magazine, October 1, 2002, NETWORK DEFENSE; Pg. 66, 2166 words, Rik Farrow 70. New equipment World Oil, October 2002 , DEPARTMENTS, 799 words 71. The Business Lawyer, November, 2002, SURVEY., 15216 words 72. Is Our Infrastructure Open To Online Terror?; Beefing Up Security; Command-and-control for U.S. gas, water, rail could yet be vulnerable Investor's Business Daily, November 5, 2002 Tuesday, SECTION INTERNET & TECHNOLOGY; NATIONAL EDITION; Pg. A06, 1199 words, BY DONNA HOWELL 73. CRITICAL INFRASTRUCTURE SECURITY AND YOU Network Computing Asian Edition, December 1, 2002, 1229 words, Rik Farrow 74. IT Security: Who's Investing in What? Regulatory and market forces put the pressure on information technology to perform. PUBLIC UTILITIES FORTNIGHTLY, January 1, 2003, ARTICLE; Pg. 18, 3419 words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor of Public Utilities Fortnightly. 75. CHALLENGES FOR SELECTED AGENCIES AND INDUSTRY SECTORS GAO Reports, February 28, 2003, Friday, GAO REPORT, 20950 words, ROBERT F. DACEY 76. Get safe: Prepare for Security Intrusion; Threats to control-system security are like the weather ... you can't control it, but you can construct adequate shelter. Avoid drama and crisis; ensure control systems can weather security intrusion storms., Control Engineering, March 01, 2003, Features; Cover Story; Pg. 34, 3128 words, Dave Harrold, Control Engineering 77. New threats prompt renewed security scrutiny for product storage sites Oil & Gas Journal, March 3, 2003, TRANSPORTATION; Pg. 52, 3490 words, Robert I. Williams; SCADA Systems Engineering and Training Consultants, Mold, Flintshire, UK 78. Rising Threat -- As war looms, the risk of cyberattacks from hackers and terrorists grows. Are you ready? InformationWeek, March 10, 2003, NEWS SECURITY; Pg. 22, 1366 words, George V. Hulme 79. President's Plan Causes No 'Heartache' for Industry Chemical Week, March 12, 2003, INFORMATION TECHNOLOGY; Cybersecurity; Pg. 21, 508 words, ESTHER D'AMICO 80. MI2G Satellite hacker attacks planned with Eastern European help M2 PRESSWIRE, April 1, 2003, 1285 words 81. Cyber Terrorism Expert Available for Interviews PR Newswire, April 3, 2003 Thursday, FINANCIAL NEWS, 802 words 82. MI2G Digital turbulence points to deepening instability in Middle East M2 PRESSWIRE, April 10, 2003, 1144 words 83. MI2G Monthly world record for overt digital attacks broken; Politically motivated attacks major contributing force M2 PRESSWIRE, May 21, 2003, 1177 words 84. Industrial security gets a Linux-based lock Breaking News from globeandmail.com, June 11, 2003 9:59 AM EST, CAT3; einsider, 602 words, ij; Robert Lemos; CNET 85. The cyberspace invaders; FEATURES - REPORTAGE Sunday Age (Melbourne, Australia), June 22, 2003 Sunday, NEWS; Pg. 15, 2551 words, Gary Hughes 86. CYPERSECURITY ISSUES Federal Document Clearing House Congressional Testimony, June 25, 2003 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5435 words 87. Ready for a cyber attack on your control systems? Platts Energy Business & Technology, July 2003, SECURITY; Vol. 5, No. 6; Pg. 46, 1455 words, By Joseph M. Weiss, PE; Joseph M. Weiss, PE is an executive consultant with KEMA Inc., Fairfax, Va. He is based in California and can be reached at (408) 253-7934 or jweiss () kemaconsulting com. 88. Securing Our Water Systems And Their Infrastructures The Journal of Counterterrorism & Homeland Security International, 2003 Summer, Vol. 9, No. 3, 2586 words, Edward J. Courtney; Edward J. Courtney has been Deputy Commissioner of the Department of Public Works for the City of Yonkers, New York since 1996. He presently serves as a member of the city's Emergency Management Planning Committee. He is a former police lieutenant, civil service commissioner, and director of Civil Defense and Disaster Preparedness for the city. Presently, he is a member of IACSP, the Middle East Forum, the Center for Security Policy, and the Homeland Security Leadership Alliance. Contact: ejc41 () yahoo com 89. Red alert on the e-war front; Is it possible to take down a superpower using only a keyboard, a mouse and an internet connection? With corporate and government bodies across the US taking the threat of electronic terrorism seriously, Duncan Graham-Rowe decided to give it a go, New Scientist, July 05, 2003, Features; Pg. 38, 2458 words, Duncan Graham-Rowe 90. Alliance tests distributed energy control system Inside Energy /with Federal Lands, July 7, 2003, Pg. 1, 1090 words, David Jones 91. CYPERSECURITY ISSUES Federal Document Clearing House Congressional Testimony, July 22, 2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 6855 words 92. PREPARED STATEMENT OF DANIEL G. WOLF DIRECTOR OF INFORMATION ASSURANCE NATIONAL SECURITY AGENCY BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON CYBERSECURITY, SCIENCE AND RESEARCH & DEVELOPMENT SUBJECT - "CYBERSECURITY GETTING IT RIGHT" Federal News Service, July 22, 2003 Tuesday, PREPARED TESTIMONY, 5375 words 93. CYPERSECURITY ISSUES Federal Document Clearing House Congressional Testimony, July 22, 2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 5423 words 94. PREPARED TESTIMONY OF ROBERT F. DACEY DIRECTOR, INFORMATION SECURITY ISSUES BEFORE THE HOUSE COMMITTEE ON ARMED SERVICES SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES, Federal News Service, July 24, 2003 Thursday, PREPARED TESTIMONY, 11720 words 95. Customised hacking, New Scientist, August 2, 2003, Letters; Letters; Pg. 23, 148 words, John Crowther, Morissen, Switzerland 96. BlackIce; Corporate America is still in denial about the threat of cyber-terrorist attacks against critical facilities in the energy, telecommunications and financial industries. By Dan Verton Computerworld, August 11, 2003, BIZ - FEATURES; Pg. 35, 1651 words 97. SPECIAL REPORT INTRODUCTION ABC News Transcripts, August 14, 2003 Thursday, 11086 words 98. Q&A 14:30 CNN INTERNATIONAL, August 15, 2003 Friday, NEWS; DOMESTIC, 1933 words, Michael Holmes 99. Florida's Power Grid Can Withstand A Crisis, Officials Say Tampa Tribune (Florida), August 16, 2003, Saturday,, NATION/WORLD,, 764 words, MICHAEL SASSO and WILL RODGERS, The Tampa Tribune; Reporter Michael Sasso can be reached at (813) 259-7865 or msasso () tampatrib com. Reporter Will Rodgers can be reached at (813) 259-7870 or wjrodgers () tampatrib com. 100. Blackout prompts worries about security of power grid USA TODAY, August 19, 2003, Tuesday,, 533 words, Kevin Maney and Michelle Kessler 101. Computer Virus Expert Available for Interviews on SoBig and Worm Viruses PR Newswire, August 21, 2003 Thursday, FINANCIAL NEWS, 650 words 102. Expert on Internet Security and Computer Viruses Available for Media Interviews PR Newswire, August 26, 2003 Tuesday, FINANCIAL NEWS, 649 words 103. MI2G August sees burst of malware activity M2 PRESSWIRE, August 27, 2003, 1053 words 104. Electricity grids left wide open to hackers, New Scientist, August 30, 2003, News; This Week; Pg. 5, 595 words, Duncan Graham-Rowe 105. Cyber-Terrorism Revealed; New Book Explores High-Tech Terrorism & America's Growing Vulnerability PR Newswire, September 2, 2003 Tuesday, LIFESTYLE, 1053 words 106. MI2G Linux remains most attacked server OS M2 PRESSWIRE, September 11, 2003, 1005 words 107. MI2G Top 10 malware targets Microsoft software; Combined economic damage $72 billion M2 PRESSWIRE, September 11, 2003, 1090 words 108. Computers failed in 4 places just before August blackout Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa Dixon Murray and John Funk, Plain Dealer Reporters 109. Computers failed in 4 places just before August blackout Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa Dixon Murray and John Funk, Plain Dealer Reporters 110. Congress Calls Upon Computerworld Senior Writer and Cyber-Security Expert to Testify on the Security of National Infrastructure Business Wire, September 15, 2003, Monday, 877 words 111. A 'Virtual' Reality PUBLIC UTILITIES FORTNIGHTLY, September 15, 2003, CYBER SECURITY; Pg. 48, 3337 words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor of Public Utilities Fortnightly. Contact her at jalvey () pur com. 112. DHS science chief sees industry shielding assets Inside Energy /with Federal Lands, October 6, 2003, Pg. 1, 1076 words, David Jones 113. BCIT cyber security expert warns U.S. congressional subcommittee of critical infrastructure vulnerabilities Canada NewsWire, October 9, 2003, Thursday, DOMESTIC NEWS, 806 words 114. Weak links leave U.S. electricity grid vulnerable to attack Akron Beacon Journal, October 28, 2003, Tuesday, DOMESTIC NEWS, 1368 words, By Ed Meyer 115. Cyber Security Solutions Growing for Utilities Natural Gas Week, October 29, 2003, CURRENT, 1103 words 116. Cyber Security Solutions Growing for Utilities Natural Gas Week, October 29, 2003, CURRENT, 1103 words 117. Dispelling cyber attack myths: the first step in securing vulnerable control systems. Utility Automation, November 2003, Pg. 26, 2041 words 118. DOE laboratories look at buttressing energy facilities against cyber attack Inside Energy /with Federal Lands, November 3, 2003, ENERGY SECURITY; Pg. 7, 1292 words, David Jones 119. Ice storm The Age (Melbourne, Australia), November 18, 2003 Tuesday, COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton 120. Ice storm Sydney Morning Herald (Australia), November 18, 2003 Tuesday, COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton 121. Computer worms, viruses pose serious threats to utility control systems Electric Light & Power, December, 2003, NEWS; Pg. 6, 951 words, JOSEPH WEISS, KEMA; Weiss is an executive consultant at KEMA. He is also a member of ISA's process control systems security committee -- SP99, and CIGRE's task force on cyber security. Weiss is located in California and may be reached at jweiss () kemaconsulting com or 408-253-7934. 122. Security: The year ahead InfoWorld, January 5, 2004, BREAKING NEWS; Pg. 17, 526 words, Paul Roberts 123. Policy Papers, January 20, 2004, 11549 words 124. Cyber security: read the FAQs, mount a defense, set up an offense! Control Solutions International, February 2004, 653 words 125. Intrusic's Zephon Detects, Ousts Enemy Sleeper Cells Embedded Inside Corporate and Government IT Systems Business Wire, February 23, 2004 Monday, 751 words 126. CYPERTERRORISM Federal Document Clearing House Congressional Testimony, February 24, 2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2266 words 127. CYPERTERRORISM Federal Document Clearing House Congressional Testimony, February 24, 2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 4410 words 128. HEARING OF THE TERRORISM, TECHNOLOGY, AND HOMELAND SECURITY SUBCOMMITTEE OF THE SENATE JUDICIARY COMMITTEE SUBJECT: VIRTUAL THREAT, REAL TERROR: CYBERTERRORISM IN THE 21ST CENTURY CHAIRED BY: SENATOR JON KYL (R-AZ) LOCATION: 226 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, February 24, 2004 Tuesday, CAPITOL HILL HEARING, 15769 words 129. CYBERSECURITY Federal Document Clearing House Congressional Testimony, March 30, 2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2687 words 130. CYBERSECURITY Federal Document Clearing House Congressional Testimony, March 30, 2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 8290 words 131. Communications Daily, March 31, 2004, Wednesday 132. Hill Panel Sounds Alarm on Telecom Network Vulnerability WASHINGTON INTERNET DAILY, MARCH 31, 2004, Vol.5, No.62, 904 words 133. US warns of cyber attacks PACE (Process & Control Engineering) (Australia), April 2004, 587 words, Denes Bolza 134. Utilities' Security Is Too Lax, Report Says -- General Accounting Office cites threat of cyberattacks against control systems InformationWeek, April 5, 2004, NEWS; Security; Pg. 24, 611 words, Martin J. Garvey 135. GAO: SCADA Systems Vulnerable to Terrorists THE ELECTRICITY DAILY, April 8, 2004, Thursday, Vol. 22, No. 68, 646 words 136. mounting concerns over SCADA security Electric Light & Power, May 2004/June 2004, Pg. 39, 867 words, Gary Sevounts, Symantec Corp.; Sevounts is director of industry solutions for Symantec Corporation and is responsible for delivering customized information security solutions to investor-owned companies within the electric power sector. He can be reached at gsevounts () symantec com. 137. PROVE IT Information Security, May, 2004, EXPOSE; Pg. 24, 1665 words, By Erik Sherman; ERIK SHERMAN (ebs () eriksherman com) is a Massachusetts-based freelance writer. 138. Power play; They could turn out your lights, cut off your water and leave your phone line dead. Why are vital networks such as power grids and water supplies so vulnerable to hackers, and can one of the world's largest experiments prevent total meltdown? Duncan Graham-Rowe investigates, New Scientist, May 15, 2004, Technology; Technology; Pg. 24, 2557 words, Duncan Graham-Rowe; Duncan Graham-Rowe is a freelance journalist 139. The Terrorist Threat to the Gas and Oil Sectors:; A Comprehensive Threat Assessment The Journal of Counterterrorism & Homeland Security International, 2004 Summer, Vol. 10, No. 4, 4404 words, Dr. Joshua Sinai 140. CYPERSECURITY Federal Document Clearing House Congressional Testimony, June 2, 2004 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2421 words 141. DIGITAL MOLES IN LARGE-SCALE NETWORKS: How the Bad Guys Get In Security Technology Executive, July 2004, GOVERNMENT & HOMELAND SECURITY SUPPLEMENT, 1138 words, By Peiter Mudge Zatko 142. Utility Merges Mission-Critical Networks, Transmission & Distribution World, July 1, 2004, ISSN: 1087-0849; Pg. 7, 2211 words, By Kevin Streett, Overton Power District No. 5 143. Certicom CodeSign Enables Secure Code Distribution; Browser-based code-signing application secures remote provisioning in wireless and cable environments Canada NewsWire, July 21, 2004, Wednesday, FINANCIAL NEWS, 1126 words 144. Certicom CodeSign Enables Secure Code Distribution PR Newswire, July 21, 2004 Wednesday, FINANCIAL NEWS, 1097 words 145. Out of Control CSO Magazine, August 1, 2004, FEATURE, 2862 words, Todd Datz 146. Mission: Critical Information Security, September, 2004, SPECIAL REPORT; Pg. 26, 3188 words, By Stephen Barlas, Alan Earls, Michael Fitzgerald, Jerri Ledford and Dennis McCafferty; This report was written by Information Security contributing writers STEPHEN BARLAS (government), ALAN EARLS (financial services), MICHAEL FITZGERALD (energy), JERRI LEDFORD (telecommunications) and DENNIS McCAFFERTY (transportation). 147. PROTECTING FINANCIAL INFRASTRUCTURE Federal Document Clearing House Congressional Testimony, September 8, 2004 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5810 words 148. New and original study on industrial cyber security reveals tenfold increase in number of successful attacks on process control and SCADA systems since 2000 PR Newswire US, October 4, 2004 Monday, 876 words 149. New and original study on industrial cyber security reveals tenfold increase in number of successful attacks on process control and SCADA systems since 2000 Canada NewsWire, October 4, 2004, Monday, DOMESTIC NEWS, 776 words 150. Plant automation, IT dead center in cyber terrorism concerns MSI, November 1, 2004, VIEWS FROM THE FRONT; Top of Mind at ISA; Pg. 10, 667 words, by Staff 151. Microsoft patch management a top-level plant-floor concern MSI, November 1, 2004, VIEWS FROM THE FRONT; Plant-Floor Security; Pg. 18, 293 words, by Staff 152. Industrial Net Security Found Lacking; Study sees tenfold spike in attacks on systems running trains, factories Investor's Business Daily, November 9, 2004 Tuesday, SECTION INTERNET & TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A05, 884 words, BY DONNA HOWELL 153. The battle against cyberterror; The race is on to harden the nation's critical infrastructure before cyberterrorists gain enough skills to launch attacks. Network World, November 29, 2004, NEWS; Pg. 49, 822 words, JOHN BLAU 154. Cybersecurity: It Doesn't Come In A Box The Metropolitan Corporate Counsel, December, 2004, KELLEY DRYE; Pg. 6, 2154 words, STEPHEN M. ARNER , KELLEY DRYE & WARREN LLP; Stephen M. Arner is an attorney in the Tysons Corner office of Kelley Drye & Warren LLP where his practice focuses on litigation and cybersecurity. 155. TDi Signs Cooperative Research and Development Agreement With INEEL Business Wire, December 22, 2004 Wednesday 3:20 PM GMT, 555 words 156. analyzing cyber security Electric Light & Power, January 2005 / February 2005, NEWS; Pg. 17, 952 words, Gary Sevounts, Symantec; As director of electric power solutions for Symantec Corporation, Gary Sevounts is responsible for the definition and introduction of enterprise security solutions in the electric power industry. 157. Report warns of increased industrial security risk CIO Canada, February 1, 2005, Pg. n/a, 252 words, Dubowski, Stefan 158. Control systems cyber security; Terrorist threats, hackers, disgruntled employees, and vulnerable process control systems in highly volatile industries give plenty of cause for concern. Should voices calling for greater security be heeded, or are they just the cries of modern-day Chicken Littles? Control Engineering, February 1, 2005, FEATURES; Cover Story; Pg. 26, 2260 words, Bryan L. Singer, chairman ISA SP-99, and Joe Weiss, KEMA. Bryan L. Singer is chairman of ISA SP-99 and works for Rockwell Automation as a senior business consultant and leader for security services. Joseph Weiss, PE, CISM, is executive consultant at KEMA and chairman of the IEEE Power Engineering Society's task force reviewing equipment standards for cyber security, a member of ISA's process Control Systems Security Committee - SP99, and CIGRE's Task Force on cyber security. 159. InfoSec Institute and Core Security Technologies Work Together to Provide an Improved Ethical Hacking Course Business Wire, February 22, 2005 Tuesday 11:56 PM GMT, 409 words 160. Plant-floor security, by the numbers; Count the ways to secure your plant-floor data, networks, and operations Manufacturing Business Technology, March 1, 2005, APPLICATIONS AND SERVICES; Pg. 24, 2037 words, By Nancy Bartels, senior editor 161. Hackers Target U.S. Power Grid; Government Quietly Warns Utilities To Beef Up Their Computer Security The Washington Post, March 11, 2005 Friday, Financial; E01, 1502 words, Justin Blum, Washington Post Staff Writer 162. U. Illinois team works to secure data systems for homeland security University Wire, March 15, 2005 Tuesday, 759 words, By Liz Deavila, Daily Illini; SOURCE: U. Illinois 163. Industrial Ethernet: IEC, go back to the negotiation table; Hubert Kirrmann, a member of the Swiss National Committee, tells why he and his colleagues have voted against the IEC standardisation proposals for Ethernet. Control Engineering Europe, April 1, 2005, FEATURE ARTICLES; Pg. 26, 1893 words, Hubert Kirrmann 164. SPECIAL REPORT; ARE OUR CRITICAL SYSTEMS SAFE FROM CYBER ATTACK? Computing, April 21, 2005, Pg.26, 2269 words 165. Three-zone security Control Engineering, June 1, 2005, DEPARTMENTS; Insight; IT and engineering; Pg. 22, 692 words, Dennis Brandl, BR&L Consulting. Dennis Brandl, dbrandl () brlconsulting com , is the president of BR&L Consulting, a consulting firm focusing on manufacturing IT solutions, based in Cary, N.C. 166. Many Facets, One Point; Safeguarding data in automation and control systems boils down to risk assessment that emphasizes policies and procedures as much as technology. Control Engineering, July 1, 2005, FEATURES; HMI Security; Pg. 41, 2420 words, Jeanine Katzel, Control Engineering 167. Vendors Need to Present Convincing Business Plans to Justify Investments on SCADA Systems Business Wire, July 19, 2005 Tuesday 12:00 PM GMT, 889 words 168. SECURING CYBERSPACE CQ Congressional Testimony, July 19, 2005 Tuesday, CAPITOL HILL HEARING TESTIMONY, 5697 words 169. SCADA goes into outer space PACE (Process & Control Engineering) (Australia), August 2005, 999 words 170. Al-Qaida Recruiting Target: Skilled Hackers; Cyberterrorism Threat; Ex-Justice Dept. official says terror organizations seek coordinated attacks Investor's Business Daily, August 19, 2005 Friday, SECTION INTERNET & TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A04, 942 words, BY DOUG TSURUOKA 171. Networks still vulnerable The Capital (Annapolis, MD), August 21, 2005 Sunday, BUSINESS; Pg. B1, 778 words, DAVID E. LEIVA, Staff Writer 172. Internet Security Systems Protects SCADA Networks, Helps To Ensure Stability of National Infrastructure; Company Adds Specialized SCADA Protection to its Intrusion Prevention Technology Business Wire, August 24, 2005 Wednesday 11:45 AM GMT, 771 words 173. Networks are 'potential for disaster' The Maryland Gazette, August 24, 2005 Wednesday, BUSINESS; Pg. A6, 789 words, DAVID E. LEIVA, Staff Writer 174. Security Tips That Will Scare-And Help-You InformationWeek, August 29, 2005, BUSINESS TECHNOLOGY; Pg. 76, 721 words, Bob Evans 175. Trusted Network Technologies' Utility IT Study Reveals Expectations of Critical Energy Systems Breaches; Utilities Executives Burdened by Compliance, but Optimistic Regarding Security and Identity Management Efforts Business Wire, August 29, 2005 Monday 11:01 AM GMT, 810 words 176. CYBERSECURITY VULNERABILITIES CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL HEARING TESTIMONY, 2516 words 177. CYBERSECURITY VULNERABILITIES CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL HEARING TESTIMONY, 6000 words 178. Terrorism's New Operating System National Review, September 16, 2005, Friday, National Review Online, 1431 words, By Mansoor Ijaz 179. NEWS; BP LEADS SECURITY INITIATIVE. Computing, September 22, 2005, Pg.1, 429 words, Daniel Thomas. 180. Crescent Tech Vent. Interim Results London Stock Exchange Aggregated Regulatory News Service (ARNS), September 30, 2005 Friday 2:00 AM GMT, 542 words 181. Securing the process industries; Everyone wants a secure plant floor, but process manufacturers have special concerns that require unique strategies Manufacturing Business Technology, October 1, 2005, SECURITY AND WIRELESS; Pg. 52, 2132 words, By Nancy Bartels, senior editor 182. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL HEARING TESTIMONY, 3189 words 183. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL HEARING TESTIMONY, 4053 words 184. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL HEARING TESTIMONY, 5031 words 185. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL HEARING TESTIMONY, 3972 words 186. HEARING OF THE ECONOMIC SECURITY, INFRASTRUCTURE PROTECTION, AND CYBERSECURITY SUBCOMMITTEE AND THE EMERGENCY PREPAREDNESS, SCIENCE, AND TECHNOLOGY SUBCOMMITTEE OF THE HOUSE HOMELAND SECURITY COMMITTEE SUBJECT: SCADA AND THE TERRORIST THREAT: PROTECTING THE NATION'S CRITICAL CONTROL SYSTEMS CHAIRED BY: REPRESENTATIVE DANIEL LUNGREN (R-CA) WITNESSES: DONALD "ANDY" PURDY, ACTING DIRECTOR, NATIONAL CYBER SECURITY DIVISION, DEPARTMENT OF HOMELAND SECURITY; DR. SAM VARNADO, DIRECTOR OF INFORMATION OPERATIONS CENTER, SANDIA NATIONAL LABORATORY; DR. WILLIAM RUSH, INSTITUTE PHYSICIST, GAS TECHNOLOGY INSTITUTE; LARRY TODD, DIRECTOR, SECURITY, SAFETY AND LAW ENFORCEMENT, BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR; DR. K. P. ANANTH, ASSOCIATE LABORATORY DIRECTOR, NATIONAL AND HOMELAND SECURITY, IDAHO NATIONAL LABORATORY; ALAN PALLER, DIRECTOR OF RESEARCH, THE SANS INSTITUTE LOCATION: 311 CANNON HOUSE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, October 18, 2005 Tuesday, CAPITOL HILL HEARING, 15371 words 187. Security update Control Engineering, November 1, 2005, DEPARTMENTS; Editorial; Pg. 2, 482 words, By David Greenfield, Editorial Director 188. Verano Announces Second Generation Industrial Defender(R) SCADA Cybersecurity Solution; Enhanced Scalability and Security Agents Provide Comprehensive Protection, Enable Compliance With NERC CIP Standards PR Newswire, November 1, 2005 Tuesday 1:01 PM GMT, 1084 words 189. Black Hat Federal 2006 Briefings Begin on January 25th; Dr. Linton Wells II, Principal Deputy Assistant Secretary of Defense, Keynotes on Security Research and Vulnerability Disclosure; Simson Garfinkel on Hard Drive Forensics, David Aitel and Billy Hoffmann on Worm Writing, Joanna Rutkowska and John Heasman on Advanced Rootkits, Robert Graham on SCADA Systems, Halvar Flake on Exploiting a New Vulnerability Class, and David Litchfield on New Oracle Vulnerabilities and Fixes PR Newswire, January 18, 2006 Wednesday 11:31 PM GMT, 790 words 190. Key U.S. systems vulnerable to hacking, security firm says Chattanooga Times Free Press (Tennessee), January 26, 2006 Thursday, WIRE - GENERAL NEWS; Pg. A6, 794 words 191. Government lab keeps hackers away from control systems Manufacturing Business Technology, February 1, 2006, VIEWS FROM THE FRONT; Plant-Floor Security; Pg. 8, 453 words, By Staff 192. The Feds Step In Government Security, February 1, 2006, Pg. 18, 2081 words, By Michael Fickes 193. SCADA systems at risk for attacks Mobile Radio Technology, February 1, 2006, NEWS; Pg. 8, 785 words, BY GLENN BISCHOFF 194. Confab to examine security of utility, other control systems Network World, February 27, 2006, NEWS; Pg. 10, 423 words, Cara Garretson 195. REP. REICHERT RECEIVES SECURITY LEADERSHIP AWARD FOR HEARING RESULTS US Fed News, March 8, 2006 Wednesday 5:31 AM EST, 442 words, US Fed News 196. Tier-3: Australian defence systems protected by Tier-3; Tier-3 launches Huntsman Threat Management Technology capable of managing both known and unknown threats M2 Presswire, April 24, 2006, 1093 words 197. Evaluation: Control System Security Software; Major fossil-fueled power plant cannot afford control interruptions due to security breaches or system glitches. Control Engineering, May 1, 2006, FEATURES; Inside Process; Pg. IP15, 780 words, Ron Derynck. Ron Derynck is director of product strategies at Verano Inc. 198. Green Hills Software Announces Landmark POSIX Certification; INTEGRITY Workstation First Desktop and Enterprise Class System to Be Certified POSIX.1 Conformant Under the IEEE and The Open Group POSIX(R) Certification Program Market Wire, May 1, 2006 Monday 5:00 AM GMT, 1082 words 199. The future starts here ... PACE (Process & Control Engineering) (Australia), May 2006, 5008 words 200. Science&Technology: The enemy within; Could a ruthless new breed of cyber-terrorist cause meltdown at the click of a mouse? Jimmy Lee Shreeve reports The Independent (London), May 31, 2006 Wednesday, FEATURES; Pg. 8, 1632 words, Jimmy Lee Shreeve 201. TECHNOLOGY ENEMY WITHIN The Statesman (India), June 5, 2006 Monday, 1480 words 202. Top Cyber Security Post Still Unfilled After a Year TechNews, July 12, 2006 Wednesday 3:54 AM GMT, TECHNOLOGY; Special; 08, 1193 words, By Brian Krebs, washingtonpost.com Staff Writer 203. Top Cyber Security Post Still Unfilled After a Year Washingtonpost.com, July 12, 2006 Wednesday 4:40 PM EST, TECHNOLOGY, 1193 words, Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com 204. Top Cyber Security Post Still Unfilled After a Year TechNews, 1216 words, Brian Krebs; washingtonpostcom Staff Writer 205. Scientists teaching power grid, dam operators how to thwart hackers The Associated Press State & Local Wire, July 19, 2006 Wednesday 7:38 AM GMT, STATE AND REGIONAL, 335 words, By CHRISTOPHER SMITH, Associated Press Writer 206. Agencies to Teach Cybersecurity Protection Associated Press Online, July 19, 2006 Wednesday 9:57 PM GMT, BUSINESS NEWS, 267 words, By CHRISTOPHER SMITH, Associated Press Writer 207. Agencies to teach cybersecurity protection AFX International Focus, July 19, 2006 Wednesday 11:13 PM GMT, 292 words 208. Agencies to teach cybersecurity protection AFX.COM, July 19, 2006 Wednesday 11:13 PM GMT, 292 words 209. Agencies to teach cybersecurity protection AFX - Asia, July 19, 2006 Wednesday 10:58 PM GMT, 292 words 210. TECHBITS: AI anniversary, Blog survey, Kids game, AIM for business, Cybersecurity The Associated Press, July 19, 2006 Wednesday 9:23 PM GMT, BUSINESS NEWS, 1512 words, By The Associated Press 211. TECHBITS: AI anniversary, Blog survey, Kids game, AIM for business, Cybersecurity Associated Press Financial Wire, July 19, 2006 Wednesday 9:24 PM GMT, BUSINESS NEWS, 1512 words, By The Associated Press 212. What happens when the Net is attacked?; That's the question an obscure Homeland Security project is attempting to answer. So far, so good. Government Computer News, July 24, 2006 Monday, TECH-REPORT, 1856 words, William Jackson, GCN Staff 213. CYBER SECURITY ISSUES CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL HEARING TESTIMONY, 3289 words 214. CYBER SECURITY ISSUES CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL HEARING TESTIMONY, 3290 words 215. Is Your Cyberterrorism Prevention Effort Missing the Mark? Security Director's Report, August 2006, CORPORATE SECURITY, 2136 words 216. Control Systems Can't Hide from Hackers, Don't Ruffle Researchers WASHINGTON INTERNET DAILY, August 23, 2006 Wednesday, TODAY'S NEWS, 772 words 217. Paller: Government cybersecurity gets an F InfoWorld, September 11, 2006 Monday, BREAKING NEWS, 692 words 218. FUTURE OF DHS CYBER AND TELECOMMUNICATIONS SECURITY CQ Congressional Testimony, September 13, 2006 Wednesday, CAPITOL HILL HEARING TESTIMONY, 3277 words 219. SECURITY LACKING IN NETWORKS CONTROLLING CRITICAL INFRASTRUCTURE Cox News Service, September 28, 2006 Thursday, Financial Pages, 2133 words 220. IDAHO LAB A PRIME DEFENDER OF NATION'S SCADA NETWORKS Cox News Service, September 28, 2006 Thursday, Financial Pages, 588 words 221. With SCADA. <PUB>Cox News Service</PUB> Cox News Service, September 28, 2006 Thursday, Financial Pages, 157 words 222. With SCADA. <PUB>Cox News Service</PUB> Cox News Service, September 28, 2006 Thursday, Financial Pages, 229 words 223. Federal security rules fueling energy company anxiety; SCADA systems seen as vulnerable to cyberattack. Network World, September 28, 2006, Pg. 1, 1121 words, Ellen Messmer 224. Eds: Corrects number in third section from 24 to 17 percent. Cox News Service, September 29, 2006 Friday, Financial Pages, 157 words 225. Computer networks control America's electricity infrastructure, its nuclear power plants, its pipelines and many other functions. But because the networks have exposure to the Internet, it makes them ... VULNERABLE TO HACKER ATTACKS The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS; Pg. 1G, 1964 words, BOB KEEFE; Cox Washington Bureau 226. Cox News Service, October 1, 2006 Sunday, Domestic; Non-Washington; General News Item, 1692 words, BOB KEEFE 227. Idaho lab in security race; Hardware suppliers can test the safety of equipment The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS; Pg. 5G, 497 words, BOB KEEFE; Cox Washington Bureau 228. Next attack could be silent, digital Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg. A01, 2021 words, Bob Keefe WEST COAST BUREAU 229. Government offers companies expert hacker advice Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg. A09, 574 words, Bob Keefe WEST COAST BUREAU 230. NUCLEAR SAFETY: U.S. plant computer systems vulnerable to hackers, experts say Greenwire, October 2, 2006 Monday, Security, 367 words 231. Workshops identify threats to process control systems Oil & Gas Journal, October 9, 2006, PROCESSING; SPECIAL Report; Pg. 44, 4446 words, Annie McIntyre, Sandia National Laboratories Albuquerque. Annie McIntyre is a senior member of the technical staff at Sandia National Laboratories, Albuquerque. In the Networked Systems Survivability organization, her primary areas of research include threats, vulnerabilities, and protection of critical infrastructure under the I3P program and leading security metrics efforts under the National SCADA Test Bed. Previous to this, McIntyre worked extensively in the defense sector on information warfare and survivability, serving as IO Laboratory Chief and Information Warfare Lead for Future Combat Systems Assessments at the Army Research Laboratory. She previously served as New Mexico Regional Manager for Concurrent Technologies Corp. and performed systems analysis and engineering under the Human Genome Project. She holds a BS from New Mexico Tech, an MS from Troy State University, and is a member of AAPG.; Jason Stamp, Sandia National Laboratories Albuquerque. Jason Stamp is a principal member of the technical staff at Sandia National Laboratories, where he has more than 7 years' experience in the field of information systems and national security. His research areas include the development of improved tools for information security and the integration of network technology into security architectures for infrastructure, homeland security, and the military. Stamp holds a BS (1995) in electrical engineering from the Rose-Hulman Institute of Technology, Terre Haute, Ind., and a PhD (1998) in electrical engineering from Clemson University. Jason is a member of the Power Engineering Society of IEEE.; Ben Cook, Sandia National Laboratories Albuquerque. Ben Cook is a principal member of the technical staff at Sandia National Laboratories. He currently leads research efforts on robust critical infrastructure systems and supports the management of Sandia's process control research and development. Cook is the technical project leader for the I3P's process control security research program, and Sandia's project lead on the DHS LOGIIC project. His technical background is in modeling and simulation with an emphasis on large-scale natural and engineered systems. Cook holds a ScD in information technology from the Massachusetts Institute of Technology.; Andrew Lanzone, Sandia National Laboratories Albuquerque. Andrew Lanzone is a senior member of the technical staff at Sandia National Laboratories. He has several years experience in both cryptographic research and applied cryptography with an emphasis on algorithm development and software programming. Lanzone spent several years designing and analyzing cryptographic protocols and digital security systems. He holds a BS in electrical engineering from Grove City College, Pa., and a Masters of computer science and engineering from the University of Michigan. 232. LOGIIC HELPS KEEP OIL, GAS CONTROL SYSTEMS SAFE US Fed News, October 9, 2006 Monday 3:44 AM EST, 642 words, US Fed News 233. Verano Expands Worldwide Distribution Network for Industrial Defender(R) MediaNet Press Release Wire, October 17, 2006 Tuesday 10:02 PM AEST, 938 words 234. VERANO EXPANDS WORLDWIDE DISTRIBUTION NETWORK Asia Pulse, October 18, 2006 Wednesday 1:39 PM EST, NATIONWIDE INTERNATIONAL NEWS, 924 words 235. United Kingdom: Be Vigilant Against Identity Theft Mondaq Business Briefing, November 22, 2006, 6307 words 236. Applied Watch Technologies - President & CEO Inter Fox News Network, December 4, 2006 Monday, BUSINESS, 554 words, Neil Cavuto 237. DHS, industry use LOGIIC to combat cyberthreats; Joint exercise focuses on protecting systems at oil and gas facilities Government Computer News, December 11, 2006 Monday, NEWS, 966 words, Kerri Hostetler, GCN Staff 238. Enterprise security measures may heighten vulnerability of plant-floor solutions Manufacturing Business Technology, January 1, 2007, INTEGRATION AND INFRASTRUCTURE; Cyber Threat Management; Pg. 50, 646 words, By Staff 239. THREAT ASSESSMENT CQ Congressional Testimony, January 11, 2007 Thursday, CAPITOL HILL HEARING TESTIMONY, 3569 words 240. CYBER SECURITY - PLANT SAFETY; Beating the hackers Process Engineering, February 5, 2007, Pg. 21, 1150 words 241. Pexx Brings a Heightened Level of Awareness With Wireless; A Better "Sense" of the World Around Us Market Wire, February 8, 2007 Thursday 6:00 AM GMT, 1624 words 242. Two new terror threats: Proposed Vancouver system puts city at risk of attack, according to police The Vancouver Sun (British Columbia), February 14, 2007 Wednesday, NEWS; Pg. A1 , 1080 words, Randy Shore, Vancouver Sun; with a file from CanWest News Service 243. Games wireless plan flawed The Calgary Herald (Alberta), February 14, 2007 Wednesday, NEWS; Pg. A3, 255 words, Randy Shore, CanWest News Service 244. WiFi could post threat during Vancouver Olympics: police expert Prince Rupert Daily News (British Columbia), February 15, 2007 Thursday, NEWS; Pg. 7, 506 words, Randy Shore, CanWest News Service 245. 10 Control System Security Threats; Based on work done by the North American Electric Reliability Corp., these control system vulnerabilities are the place to start to prevent a security breach. Control Engineering, April 1, 2007, FEATURES; Cover Story; Pg. 38, 3398 words, Peter Welander, Control Engineering. Peter Welander is process industries editor. Reach him at peter.welander () reedbusiness com . 246. CYBER INSECURITY CQ Congressional Testimony, April 19, 2007 Thursday, CAPITOL HILL HEARING TESTIMONY, 3077 words 247. Convergence of physical and IT security is becoming a necessity Government Computer News, May 9, 2007 Wednesday, DAILY-UPDATES, 481 words, William Jackson, GCN Daily Updates 248. Verano Relaunches as Industrial Defender Inc. to Fight Increasing Global Security Threats to Critical Infrastructures; Company Introduces World's First Integrated Industrial Cyber Security Solution with the Launch of its Co-Managed Security Services (CMSS) Offering PR Newswire US, May 15, 2007 Tuesday 12:00 PM GMT, 1053 words 249. FOREIGN OWNERSHIP OF INFRASTRUCTURE CQ Congressional Testimony, May 16, 2007 Wednesday, CAPITOL HILL HEARING TESTIMONY, 1819 words 250. Ten Control System security threats PACE (Process & Control Engineering) (Australia), June 2007, Pg. 18, 3299 words 251. RWE boosts security on Scada networks Computer Weekly, June 19, 2007, NEWS, 454 words 252. From ID To IP Theft Industry Week, July 2007, INFORMATION TECHNOLOGY; Pg. 49, 434 words, BY BRAD KENNEY 253. Hacker shows flaw in software that controls key infrastructure Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 254. Hacker shows flaw in software that controls key infrastructure The Associated Press, August 5, 2007 Sunday 1:20 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 255. Hacker shows flaw in software that controls key infrastructure Associated Press Financial Wire, August 5, 2007 Sunday 12:22 AM GMT, STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP Technology Writer 256. Hacker shows flaw in software that controls key infrastructure The Associated Press State & Local Wire, August 5, 2007 Sunday 12:22 AM GMT, STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP Technology Writer 257. Researcher: Flaw Exposes Hack Threat Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 258. Researcher: Flaw Exposes Hack Threat Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 259. Flaw Shown in Infrastructure Software Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 260. Researcher: Flaw Exposes Hack Threat Associated Press Online, August 5, 2007 Sunday 1:58 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 261. Researcher: Flaw Exposes Hack Threat Associated Press Online, August 5, 2007 Sunday 8:01 AM GMT, BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer 262. Fred Thompson Enters GOP Race; John Walsh Weighs in on Fight Against Child Molesters; Hillary Clinton Blocking 9/11 DVD Release CNN, September 6, 2007 Thursday, NEWS; Domestic, 7079 words, Glenn Beck 263. MULTIPLE EFFORTS TO SECURE CONTROL SYSTEMS ARE UNDER WAY, BUT CHALLENGES REMAIN GAO Reports, September 10, 2007, GAO REPORT, 8864 words 264. Authority eyes $320K in security improvements Chambersburg Public Opinion (Pennsylvania), October 11, 2007 Thursday, LOCAL, 617 words, By ADAM KULIKOWSKI Staff writer 265. SECURITY OF THE ELECTRIC GRID CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL HEARING TESTIMONY, 3961 words 266. SECURITY OF THE ELECTRIC GRID CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL HEARING TESTIMONY, 7029 words 267. New U.S. tack to defend power grid Christian Science Monitor, October 30, 2007, Tuesday, USA; Pg. 1, 1297 words, Mark Clayton Staff writer of The Christian Science Monitor 268. Security Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That Cannot Be Ignored; Pg. 1, 526 words, Staff 269. Taking steps to secure your process control system Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That Cannot Be Ignored; Pg. 1, 612 words, Staff 270. Cyber Risk Assessment; The process of plotting an appropriate cyber security strategy must begin with an analysis of where you are now. Control Engineering, November 1, 2007, SUPPLEMENTS; Cyber Security; Pg. 11, 972 words, Todd Nicholson, Industrial Defender. Todd Nicholson is chief marketing officer, Industrial Defender Inc. Reach him at tnicholson () industrialdefender com . 271. Experts worry hackers will endanger economy Newhouse News Service, December 26, 2007 Wednesday 3:09 PM EST, DOMESTIC, 816 words, By GARRY LENTON 272. CYBERTERRORISM / COMPUTER HACKERS PUT THE NATION'S ECONOMY AT RISK // GUARDING AGAINST HIGH-TECH TERRORISM Patriot News (Harrisburg, Pennsylvania), December 26, 2007 Wednesday, A SECTION; Pg. A01, 844 words, GARRY LENTON, Of The Patriot-News 273. Hackers may threaten economy; Without better security, nation's industries could lose billions, experts warn The Houston Chronicle, December 27, 2007 Thursday, A; Pg. 8, 804 words, GARRY LENTON, Newhouse News Service 274. LESSONS LEARNED: AURORA ATTACK; Test gets major media hype, but SCADA vulnerabilities remain PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 41, 1213 words, BY LORI A. BURKHART; Lori Burkhart is managing editor of Public Utilities Fortnightly. Email her at lab () pur com 275. SMART-GRID SECURITY; Intelligent power grids present vexing cyber security problems PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 43, 1238 words, BY MICHAEL T. BURR; Michael T. Burr is editor-in-chief of Public Utilities Fortnightly. Email him at burr () pur com 276. CIA says hackers brought down power grid UPI Energy, January 18, 2008 Friday 7:58 PM EST, 393 words 277. Hackers Are Going After Power Grids [Outage] Gizmodo, January 19, 2008 Saturday 5:30 PM EST, 198 words 278. Hackers Take Control of Your Electricity and Water [Hacking] io9, January 22, 2008 Tuesday 8:00 PM EST, 260 words 279. Cyber extortionists switch off the lights The Australian Financial Review, January 22, 2008 Tuesday, ABIX NEWS SUMMARIES; Pg. 47, 130 words, Julian Bajkowski 280. Which Candidate Has Best Economic Plan?; Did Over-Medication Cause Heath Ledger`s Death?; Author Says Looks Matter for Presidential Candidates CNN, January 23, 2008 Wednesday, NEWS; Domestic, 7626 words, Glenn Beck 281. Tier-3: Tier-3 says hackers hijacking power grids to extort ransom is worrying trend M2 Presswire, January 24, 2008, 486 words 282. Does Race Matter in `08?; Did Over-Medication Cause Heath Ledger`s Death?; Sean Penn at Odds with San Francisco Paper CNN, January 25, 2008 Friday, NEWS; Domestic, 7348 words, Glenn Beck 283. Computer Weekly, January 29, 2008, NEWS, 247 words, Ian Grant 284. Computer Weekly, January 29, 2008, NEWS, 248 words, Ian Grant 285. Security Experts Announce New East Coast Computer Security Conference - SOURCE 2008; Famed L0pht hackers and top security executives to discuss state of security industry and share best practices in intimate setting PR Newswire, January 31, 2008 Thursday 10:57 PM GMT, 620 words 286. Change default credentials SC (Secure Computing) Magazine, February 1, 2008, Pg. 17, 686 words, Ken Munro 287. Cyber rules guard grid ELECTRONIC ENGINEERING TIMES, February 4, 2008, BUSINESS; Pg. 25, 991 words, Sheila Riley 288. Quantifying Cyber Security Risk; Part 1: Basic risk analysis techniques can help you understand the cyber threats to industrial control systems and SCADA systems overseeing electric utility distribution. This step will help as you begin planning a defensive strategy. Control Engineering, March 1, 2008, FEATURES; Inside Process; Pg. IP12, 2000 words, Morgan Henrie, University of Alaska; Paul Liddell, Alyeska Pipeline Service. M. Henrie is a research assistant professor of logistics at the University of Alaska, Anchorage. Reach him at afmeh1 () uaa alaska edu . P. Liddell is SCADA supervisor at Alyeska Pipeline Service Co. Reach him at liddellp () alyeska-pipeline com . 289. Arab countries at threat from potential disruption to their logistics, utility and oil and gas networks Middle East Company News Wire, March 25, 2008 Tuesday 9:20 AM GMT, 669 words 290. Hydrocarbon Processing, April 2008 , HPINNOVATIONS, 4039 words 291. As Cellular Carriers Cap Unlimited Data Plans, Proxicast Introduces Cell-Sentry Cost Control and Bandwidth Management Capabilities for its 3G Cellular Routers Product News Network, April 3, 2008 Thursday 7:36 AM GMT, 1196 words 292. Slaying the hackers; Columns The Age (Melbourne, Australia), April 15, 2008 Tuesday, COMPUTERS; Next; Pg. 7, 659 words, Penelope Debelle 293. Frost & Sullivan Acknowledges Industrial Defender as Market Leader in Critical Infrastructure Cyber Security Protection; Industrial Defender Selected as Frost & Sullivan Company of the Year for Global Risk Management in Process Control and SCADA Market Wire, April 16, 2008 Wednesday 5:30 AM GMT, 760 words 294. Homeland Security's Electric Grid Focus Could Drive NERC Revisions EnergyWashington Week, April 16, 2008, 880 words 295. Frost & Sullivan Recognizes Industrial Defender's Leadership of Critical Infrastructure Cyber Security Protection Markets Business Wire, April 16, 2008 Wednesday 11:45 AM GMT, 1082 words 296. In cyberspace they can't hear you scream; The essay Sydney Morning Herald (Australia), April 19, 2008 Saturday, NEWS AND FEATURES; News Review; Pg. 29, 1836 words, Tom Allard 297. Terror's new frontier: cyberspace; SECURITY The Age (Melbourne, Australia), April 19, 2008 Saturday, INSIGHT; Pg. 4, 1662 words, Tom Allard - Tom Allard is a Fairfax reporter 298. Quantifying Cyber Security Risk; Part 2: Understanding cyber incidents and their severity can help you plot a strategy to prevent them. Control Engineering, May 1, 2008, FEATURES; Inside Process; Pg. P12, 1393 words, Morgan Henrie, University of Alaska; Paul Liddell, Alyeska Pipeline Service. Morgan Henrie is a research assistant professor of logistics at the University of Alaska, Anchorage. Reach him at afmeh1 () uaa alaska edu . Paul Liddell is SCADA supervisor at Alyeska Pipeline Service Co. Reach him at liddellp () alyeska-pipeline com . 299. Cyber Security: Are We Doing Enough? Electric Light & Power, May 2008 - June 2008, INDUSTRY REPORT; Pg. 20, 2414 words, by Nancy Spring, managing editor 300. Power plants open to hacker attack; A software package widely used to automate power stations and production lines has a serious security vulnerability New Scientist, May 17, 2008, TECHNOLOGY; News; Pg. 25, 126 words, Staff 301. PANEL III OF A HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION; SUBJECT: CHINA'S PROLIFERATION PRACTICES AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES; CHAIRED BY: COMMISSIONER PETER T.R. BROOKES, SENIOR FELLOW FOR NATIONAL SECURITY AFFAIRS AND DIRECTOR, ASIAN STUDIES CENTER, THE HERITAGE FOUNDATION; WITNESSES: COLONEL GARY D. MCALUM, DIRECTOR OF OPERATIONS, JOINT TASK FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED STATES STRATEGIC COMMAND; TIMOTHY L. THOMAS, ANALYST, THE FOREIGN MILITARY STUDIES OFFICE; LOCATION: 562 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, May 20, 2008 Tuesday, CAPITOL HILL HEARING, 15269 words 302. HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION (AS RELEASED BY THE USCC); SUBJECT: CHINA'S PROLIFERATION PRACTICES, AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES; CHAIRED BY: COMMISSIONERS PETER T.R. BROOKES AND WILLIAM A. REINSCH (HEARING COCHAIRS); WITNESSES: PANEL I: CONGRESSIONAL PERSPECTIVES REPRESENTATIVE ZOE LOFGREN (D-CA) PANEL II: PRC CYBER SPACE CAPABILITIES BRIGADIER GENERAL JEFFREY C. HORNE, USA; DEPUTY COMMANDER, JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE, UNITED STATES STRATEGIC COMMAND, VANDENBERG AIR FORCE BASE; ASHLEY J. TELLIS, SENIOR ASSOCIATE, CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE; WILLIAM B. SCOTT, FORMER BUREAU CHIEF, AVIATION WEEK & SPACE COAUTHOR: "SPACE WARS: THE FIRST SIX HOURS OF WORLD WAR III" PANEL III: PRC CYBER SPACE CAPABILITIES STATEMENT OF COLONEL GARY D. MCALUM, DIRECTOR OF OPERATIONS, JOINT TASK FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED STATES STRATEGIC COMMAND; TIMOTHY L. THOMAS, ANALYST, FOREIGN MILITARY STUDIES OFFICE; JAMES C. MULVENON, CENTER FOR INTELLIGENCE RESEARCH AND ANALYSIS, DEFENSE GROUP, INC. PANEL IV: ADMINISTRATION PERSPECTIVES STATEMENT OF MS. PATRICIA MCNERNEY, PRINCIPAL DEPUTY ASSISTANT SECRETARY OF STATE FOR INTERNATIONAL SECURITY AND NONPROLIFERATION PANEL IV: DISCUSSION, QUESTIONS AND ANSWERS.................................... 94 PANEL V: CHINA'S PROLIFERATION PRACTICES STEPHEN G. RADEMAKER, SENIOR COUNSEL, BGR HOLDING, LLC; HENRY D. SOKOLSKI, EXECUTIVE DIRECTOR, THE NONPROLIFERATION POLICY EDUCATION CENTER; LOCATION: 562 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, May 20, 2008 Tuesday, PRESS CONFERENCE OR SPEECH, 59704 words 303. TVA Power Plants Vulnerable to Cyber Attacks, GAO Finds; Regulators Want Authority to Require Security Upgrades Industry-wide Washingtonpost.com, May 21, 2008 Wednesday 12:01 AM EST, 1320 words, Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com 304. Largest public power grid at cyber risk, feds say; The TVA lacks basic security measures, U.S. Government Accountability Office says Network World, May 21, 2008, 560 words, Tim Greene 305. TVA NEEDS TO ADDRESS WEAKNESSES IN CONTROL SYSTEMS AND NETWORKS GAO Reports, May 21, 2008, GAO REPORT, 16267 words 306. TERRORISM Hi-tech threat close to home The Advertiser (Australia), May 24, 2008 Saturday, MAGAZINE; Pg. 5, 629 words, Anthony Johnson, Miles Kemp 307. U.S. House Security Panel Frets Over Electric Grid; System Still Vulnerable; Subcommittee chairman bothered that regulators have had little progress Investor's Business Daily, May 28, 2008 Wednesday, INTERNET & TECHNOLOGY; Q & A; Pg. A04, 766 words, DONNA HOWELL 308. U.S. House Security Panel Frets Over Electric Grid System Still Vulnerable Subcommittee chairman bothered that regulators have had little progress Investor's Business Daily, May 28, 2008 Wednesday, A; Q AND A; Pg. A04, 766 words, DONNA HOWELL 309. Features Power Magazine, June 2008, GRID SECURITY; Pg. 40, 2298 words, By Andrew Bartels, Aegis Technologies Inc. 310. RISK ASSESSMENT: New Data Focuses on Handling Linked Security Breaches Security Director's Report, June 2008, CORPORATE SECURITY, 1593 words 311. Cyber Incident Blamed for Nuclear Power Plant Shutdown Washingtonpost.com, June 5, 2008 Thursday 1:46 PM EST, 1255 words, Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com 312. Utilities vulnerable to hackers, experts say CNN.com, June 11, 2008 Wednesday 10:36 AM EST, TECHNOLOGY, 581 words 313. Security hole exposes utilities to Internet attack The Associated Press, June 11, 2008 Wednesday 8:32 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 314. Security hole exposes utilities to Internet attack The Associated Press, June 11, 2008 Wednesday 11:48 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 315. Security hole exposes utilities to Internet attack Associated Press Financial Wire, June 11, 2008 Wednesday 11:48 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 316. Security hole exposes utilities to Internet attack Associated Press Financial Wire, June 11, 2008 Wednesday 8:32 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 317. Security hole exposes utilities to Internet attack Associated Press Online, June 11, 2008 Wednesday 8:54 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 318. Security hole exposes utilities to Internet attack Associated Press Online, June 11, 2008 Wednesday 11:48 AM GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer 319. Software security hole shows utilities and other infrastructure vulnerable to hacking Associated Press Worldstream, June 11, 2008 Wednesday 9:17 AM GMT, INTERNATIONAL NEWS, 584 words, By JORDAN ROBERTSON, AP Technology Writer 320. Better safe than sorry Utility Week, June 13, 2008, EARLY SECTION, 1411 words 321. Top Layer TopResponse Research Team Delivers Protection against Critical CitectSCADA Buffer Overflow Vulnerability; Protection Pack with the Top Layer IPS 5500 Protects against Remote Attacks on SCADA Systems Business Wire, June 23, 2008 Monday 1:52 PM GMT, 649 words 322. FERC RECEIVES COMMENT OF KENNETH R BASS US Fed News, June 23, 2008 Monday 6:22 AM EST, 723 words, US Fed News 323. Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites Nationwide to Protect Industrial Network; Air Liquide Turns to IPS 5500 to Protect Industrial Network and SCADA Systems that It Relies on for Operation of Plant Production Across the U.S. Business Wire, June 23, 2008 Monday 1:00 PM GMT, 889 words 324. Nokia Plans Mobile Software Surge With Open-Source Symbian TECHWEB, June 25, 2008 Wednesday 6:08 PM GMT, 2084 words 325. Top Layer TopResponse Research Team Unveils CitectSCADA Protection Pack Wireless News, June 27, 2008 Friday, 232 words 326. Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites Nationwide Wireless News, June 27, 2008 Friday, 323 words 327. Air Liquide to Utilize Top Layer's IPS 5500 Intrusion Prevention Solutions Health & Beauty Close-up, June 29, 2008 Sunday, 552 words 328. NAS Sees Aging Grid Crisis A Threat To U.S. Even Without Terrorism EnergyWashington Week, July 8, 2008, 833 words 329. NAS SEES AGING GRID CRISIS AS THREAT TO U.S. EVEN WITHOUT TERRORISM Defense Environment Alert, July 22, 2008, 836 words 330. Rapid7's Latest NeXpose Release Offers Breakthrough Performance, Higher Productivity and Improved Compliance for Vulnerability Assessment Scanning; Version 4.7 of NeXpose Unified Vulnerability Management Features Critical Infrastructure Protection, High Performance Scanning for Large Enterprise Environments and Vulnerability Exception Reporting Business Wire, July 31, 2008 Thursday 12:47 PM GMT, 930 words 331. Bit9 Announces Application Whitelisting Solution for Point-of-Sale; Easiest, most effective way to control and secure POS systems and kiosks PR Newswire, August 6, 2008 Wednesday 6:08 PM GMT, 952 words 332. Bit9 Announces Application Whitelisting Solution for Point-of-Sale Product News Network, August 18, 2008 Monday 7:38 AM GMT, 917 words 333. Georgia cyberwar overblown Network World, August 19, 2008, Pg. 15, 539 words, Andreas M. Antonopoulos 334. SUBCOMMITTEE ON ENERGY AND AIR QUALITY HEARING, PROTECTING GRID FROM CYBERSECURITY THREATS. States News Service, September 11, 2008 Thursday, 649 words, States News Service 335. REP. DINGELL ISSUES STATEMENT ON PROTECTING GRID FROM CYBERSECURITY THREATS US Fed News, September 11, 2008 Thursday 1:21 AM EST, 650 words, US Fed News 336. ELECTRIC GRID AND CYBER-SECURITY THREATS CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL HEARING TESTIMONY, 670 words 337. ELECTRIC GRID AND CYBER-SECURITY THREATS CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL HEARING TESTIMONY, 3584 words 338. WIRELESS; Attitudes to wireless Process Engineering, September 15, 2008, Pg. 29, 1357 words 339. SCADA Security: Of "Paramount Importance" MENA English (Middle East and North Africa Financial Network), September 23, 2008 Tuesday, 696 words 340. Paramount launches new division for SCADA and Process Control Security Middle East Company News Wire, September 24, 2008 Wednesday 10:20 AM GMT, 666 words 341. PARAMOUNT LAUNCHES NEW DIVISION FOR SCADA AND PROCESS CONTROL SECURITY AME Info - ME Company Newswire, September 24, 2008 Wednesday, 663 words 342. Paramount signs deal with Industrial Defender The Nation (Pakistan), September 24, 2008 Wednesday, 279 words, OUR STAFF REPORTER 343. Paramount signs deal with Industrial Defender The Nation (Pakistan), September 24, 2008 Wednesday, NATIONWIDE INTERNATIONAL NEWS, 279 words 344. Computer Weekly, October 7, 2008, NEWS, 657 words, Danny Dresner, National Computing Centre 345. Supplies Important SCADA-Specific Security Signatures; Provides Industry-Leading Protection for Critical Infrastructure Networks Market News Publishing, October 13, 2008 Monday 5:28 AM PST, 1070 words 346. Secure Computing Supplies Important SCADA-Specific Security Signatures; Provides Industry-Leading Protection for Critical Infrastructure Networks; Secure Firewall Supplies Strongest Firewall on the Market to Ensure That SCADA Control Networks Are Fully Protected Market Wire, October 13, 2008 Monday 6:00 AM GMT, 1021 words 347. Nation's Largest E-Discovery and Digital Forensics Conference to Feature Speakers from the FBI, US Congress, Georgian Ambassador to the US, Former KGB Major General, and Leading Government and Private Sector Cyber Crime Experts Business Wire, October 14, 2008 Tuesday 11:00 AM GMT, 652 words 348. Secure Computing supplies important SCADA-specific security signatures Al-Bawaba, October 23, 2008 Thursday 4:57 AM EST, 469 words, By Al-Bawaba Reporters 349. Secure Computing supplies important SCADA-specific security signatures Albawaba.com, October 23, 2008 Thursday, 582 words 350. Secure Computing supplies important SCADA-specific security signatures Middle East Company News Wire, October 27, 2008 Monday 10:23 AM GMT, 565 words 351. SECURE COMPUTING SUPPLIES IMPORTANT SCADA-SPECIFIC SECURITY SIGNATURES AME Info - ME Company Newswire, October 27, 2008 Monday, 563 words 352. SECURE COMPUTING USES SCADA-SPECIFIC SECURITY SIGNATURES COMPUTER SECURITY UPDATE, November 2008, 715 words 353. Hackers vs slackers [control security] IEE Engineering & Technology, November 2008, Pg. 40, 107 words 354. No Respect Information Security, November 2008, LAYER 8; Pg. 16, 597 words, BY JAY G. HEISER. Jay G. Heiser is a London-based research vice president at Gartner. Send your comments on this column to feedback () infosecuritymag com 355. PR Newswire Summary of Technology Copy, Nov. 3, 2008 PR Newswire, November 3, 2008 Monday 9:22 PM GMT, 6752 words 356. Domestic Infrastructure-Critical Vulnerabilities and Protection discussed at TAG-College Al-Bawaba, November 6, 2008 Thursday 8:04 AM EST, 415 words, By Al-Bawaba Reporters 357. Domestic Infrastructure-Critical Vulnerabilities and Protection discussed at TAG-College Albawaba.com, November 6, 2008 Thursday, 467 words 358. DOMESTIC INFRASTRUCTURE-CRITICAL VULNERABILITIES AND PROTECTION DISCUSSED AT TAG-COLLEGE AME Info - ME Company Newswire, November 8, 2008 Saturday, 543 words 359. Domestic infrastructure-critical vulnerabilities and protection discussed at TAG-College Middle East Company News Wire, November 8, 2008 Saturday 1:51 PM GMT, 546 words 360. Green Hills Software Announces Launch of INTEGRITY Global Security, LLC; Delivering the World's Most Secure Technology Solutions Marketwire, November 17, 2008 Monday 5:00 AM GMT, 1090 words 361. Check Point Delivers Total Security for Branch Offices with Upgrade to UTM-1 Edge Appliances; Extended Unified Threat Management Capabilities with New Multi-Layer Messaging Security Deliver Best All-Inclusive Security Solution Business Wire, November 18, 2008 Tuesday 1:30 PM GMT, 967 words 362. Cyber Security Reaches "Tipping Point" in 2008; Attacks on Critical Infrastructure Systems and Cyber Warfare Will Increase in 2009; New VeriSign iDefense Report Looks Back at 2008's Most Serious Security Threats; Outlines New Trends and Security Disruptors to Develop in 2009 Marketwire, December 16, 2008 Tuesday 9:17 AM GMT, 979 words 363. Associated Press Financial Wire, December 16, 2008 Tuesday 5:17 PM GMT, BUSINESS NEWS, 1041 words 364. VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008 Entertainment Close-up, December 28, 2008 Sunday, 661 words 365. VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008 Wireless News, December 29, 2008 Monday, 661 words 366. Cyber Security Hits Home; If you've been wondering if and when you might be forced to address cyber security issues with your process control or SCADA systems, watch efforts with electric utilities. Implementations going on now could serve as models. Control Engineering, January 1, 2009, FEATURES; Critical Systems; Pg. 40, 2551 words, Peter Welander, Control Engineering. Peter Welander is process industries editor. Reach him at peter.welander () reedbusiness com . 367. Cyber Security Hits Home. Control Engineering, January 1, 2009, Pg. 40, 2663 words 368. Evolution or Revolution? Transmission & Distribution World, January 1, 2009, Pg. 67, 2234 words, By Gene Wolf, Technical Writer 369. Who goes there? Utility Week, January 30, 2009, FEATURES, 1645 words 370. Who goes there? Utility Week, January 30, 2009, FEATURES, 1645 words 371. Who goes there? Utility Week, January 30, 2009, FEATURES, 1645 words 372. HEARING OF THE SENATE SELECT COMMITTEE ON INTELLIGENCE; SUBJECT: CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES; WITNESS: ADMIRAL DENNIS BLAIR, DIRECTOR OF NATIONAL INTELLIGENCE; CHAIRED BY: SENATOR DIANNE FEINSTEIN (D-CA); LOCATION: 216 HART SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, February 12, 2009 Thursday, CAPITOL HILL HEARING, 16970 words 373. SEN. DIANNE FEINSTEIN HOLDS A HEARING ON THE "WORLD THREAT" CQ Transcriptions "All materials herein are protected by United States copyright law and may not be reproduced, distributed, transmitted, displayed, published or broadcast without the prior written permission of CQ Transcriptions. You may not alter or remove any trademark, copyright or other notice from copies of the content.", February 12, 2009 Thursday, 17678 words 374. NEW DNI STRESSES THREAT TO POWER GRID FROM CYBERSPACE Inside the Pentagon, February 19, 2009, 677 words 375. Fighting wars in cyber space; Cyber attacks are a cheap and easy way to attack another country, but now the Pentagon is learning how to fight back New Scientist, March 14, 2009, TECHNOLOGY; Feature; Pg. 18-19, 1084 words, Paul Marks 376. IMPROVING CYBERSECURITY; COMMITTEE: SENATE COMMERCE, SCIENCE AND TRANSPORTATION CQ Congressional Testimony, March 19, 2009 Thursday, CAPITOL HILL HEARING TESTIMONY, 6807 words 377. Fortify Software: Fortify says energy network hacks can be avoided through the use of code auditing and analysis M2 PressWIRE, March 26, 2009 Thursday, 488 words 378. Major Brands Communications Today (Contify.com), March 28, 2009, 20298 words 379. United States: Government seizes opportunity to build security into new critical infrastructure TendersInfo, March 31, 2009 Tuesday, 427 words, prashant03 380. United States : Government seizes opportunity to build security into new critical infrastructure TendersInfo, March 31, 2009 Tuesday, 427 words, pinto03 381. The Transparency of Wireless; Wireless networking and device manufacturers have gone to great lengths to create products that are secure, easy to work with, and operationally indistinguishable from wired equivalents. Control Engineering, April 1, 2009, FEATURES; Cover Story; Pg. 32, 2674 words, Peter Welander, Control Engineering. Peter Welander is process industries editor. Reach him at peter.welander () reedbusiness com . 382. Cyberspies have compromised U.S. power grid, newspaper reports; The intrusions appear to be pervasive, government officials tell The Wall Street Journal Network World, April 8, 2009, 667 words, Grant Gross; Ellen Messmer 383. United States: The US electrical grid: How big of a cyber target is it? TendersInfo, April 9, 2009 Thursday, 470 words, shiv03 384. How serious is threat to power grid? Depends who you ask. Network World, April 9, 2009, 953 words, Ellen Messmer 385. Lawmakers Seek to Tighten Cyber Regulation on Power Grids Washingtonpost.com, April 29, 2009 Wednesday 3:11 PM EST, 828 words, Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com 386. House Energy and Commerce Subcommittee on Communications, Technology, and the Internet Hearing; Cybersecurity: Network Threats and Policy Challenges; Testimony by Rodney Joffe, Senior Vice President and Senior Technologist, Neustar Congressional Documents and Publications, May 1, 2009, U.S. HOUSE OF REPRESENTATIVES DOCUMENTS, 3096 words 387. INFRASTRUCTURE Is U.S. vulnerable to a cyber attack? THE GRID: Few facts available in talk of cyber attacks much rhetoric, fewer facts in debate over likelihood of penetration of America's grid The Houston Chronicle, May 3, 2009 Sunday, B; Pg. 10, 1013 words, By CHRIS BRONK, KEN MEDLOCK and DAN WALLACH 388. HEARING OF THE SENATE COMMITTEE ON ENERGY AND NATURAL RESOURCES; SUBJECT: CYBERSECURITY AND CRITICAL ELECTRICITY INFRASTRUCTURE; CHAIRED BY: SENATOR JEFF BINGAMAN (D-NM); WITNESSES: MS. PATRICIA HOFFMAN, ACTING DEPUTY ASSISTANT SECRETARY, OFFICE OF ENERGY, U.S. DEPARTMENT OF ENERGY; MR. JOSEPH MCCLELLAND, FEDERAL ENERGY REGULATORY COMMISSION; MR. RICK SERGEL, NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL; MR. ALLEN MOSHER, AMERICAN PUBLIC POWER ASSOCIATION; MR. DAVID OWENS, EDISON ELECTRIC INSTITUTE;; LOCATION: 366 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, May 7, 2009 Thursday, CAPITOL HILL HEARING, 14314 words 389. Rep. Thompson Introduces Bill Concerning Federal Power Act to Provide Additional Authorities to Adequately Protect Critical Electric Infrastructure US Fed News, May 8, 2009 Friday 11:14 AM EST, 2476 words 390. Defense Department developing portable hacking device for soldiers Engadget, May 26, 2009 Tuesday 3:58 PM EST, 211 words, PRODS () WEBLOGSINC COM (Donald Melanson) 391. The Looming Cybersecurity Emergency Reaction Pacific Free Press, May 26, 2009 Tuesday 11:18 AM EST, 2994 words, Tom Burghardt antifa89202 () gmail com 392. TIP SHEET: GEORGE MASON UNIVERSITY EXPERTS AVAILABLE TO DISCUSS HEALTH DATA SECURITY/ELECTRONIC MEDICAL RECORDS States News Service, June 3, 2009 Wednesday, 1761 words, States News Service 393. George Mason University Experts Available to Discuss Health Data Security/Electronic Medical Records Targeted News Service, June 3, 2009 Wednesday 8:28 AM EST, 1707 words 394. THE CONFLUENCE OF CYBER CRIME AND TERRORISM States News Service, June 12, 2009 Friday, 4249 words, States News Service 395. House Science and Technology Subcommittee on Technology and Innovation Hearing; Agency Response to Cyberspace Policy Review; Testimony by Rep. Lipinski, Daniel - (D-IL); Agency Response to Cyberspace Policy Review; Testimony by Cita Furlani, Director, Information Technology Laboratory, National Institute of Standards and Technology (NIST) Congressional Documents and Publications, June 16, 2009, U.S. HOUSE OF REPRESENTATIVES DOCUMENTS, 3877 words 396. Addressing SIS Cyber Security; Is it First or Last?; Part 2: When considering integrated control and safety systems, building a strong defense is an investment in ensuring business continuity. How should you implement the concepts? Control Engineering, July 1, 2009 Correction Appended, FEATURES; Inside Process; Pg. P4, 1999 words, Bob Huba and Chuck Miller, Emerson Process Management. Bob Huba is a senior product manager for Emerson Process Management and coordinates security and cyber security initiatives for DeltaV products. Chuck Miller is the business development manager for safety instrumented systems for Emerson Process Management. 397. Cyber Sentries to Guard Networks Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words 398. Cyber Sentries to Guard Networks Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words 399. Vital Infrastructure, But Not Hacker-Proof Intelligence Online, July 16, 2009, CORPORATE INTELLIGENCE/TERABYTES, 317 words 400. Vital Infrastructure, But Not Hacker-Proof Intelligence Online, July 16, 2009, CORPORATE INTELLIGENCE/TERABYTES, 318 words 401. House Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology Hearing; "Securing the Modern Electric Grid from Physical and Cyber Attacks"; Testimony by Sean McGurk, Director, Control Systems Security Program National Cyber Security Division Congressional Documents and Publications, July 21, 2009, U.S. HOUSE OF REPRESENTATIVES DOCUMENTS, 2443 words 402. House Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology Hearing; "Securing the Modern Electric Grid from Physical and Cyber Attacks"; Testimony by Mark Fabro, Lofty Perch, Inc. Congressional Documents and Publications, July 21, 2009, U.S. HOUSE OF REPRESENTATIVES DOCUMENTS, 5510 words 403. REP. YVETTE D. CLARKE HOLDS A HEARING ON SECURING THE MODERN ELECTRIC GRID FROM PHYSICAL AND CYBER ATTACKS CQ Transcriptions "All materials herein are protected by United States copyright law and may not be reproduced, distributed, transmitted, displayed, published or broadcast without the prior written permission of CQ Transcriptions. You may not alter or remove any trademark, copyright or other notice from copies of the content.", July 21, 2009 Tuesday, 23972 words 404. HEARING OF THE SUBCOMMITTEE ON EMERGING THREATS, CYBERSECURITY, AND SCIENCE AND TECHNOLOGY OF THE HOUSE HOMELAND SECURITY COMMITTEE; SUBJECT: SECURING THE MODERN ELECTRIC GRID FROM PHYSICAL AND CYBER ATTACKS; CHAIRED BY: REPRESENTATIVE YVETTE D. CLARKE (D-NY) WITNESSES PANEL I: WILLIAM GRAHAM, CHAIRMAN, COMMISSION TO ASSESS THE TREAT TO THE UNITED STATES FROM ELECTROMAGNETIC PULSE; MARK FABRO, PRESIDENT AND CHIEF SECURITY SCIENTIST, LOFTY PERCH; MICHAEL ASSANTE, CHIEF SECURITY OFFICER, NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION; STEVE NAUMANN, VICE PRESIDENT OF WHOLESALE MARKETS, REPRESENTING EDISON ELECTRIC INSTITUTE, ELECTRIC POWER SUPPLY ASSOCIATION; PANEL II: JOE MCCLELLAND, DIRECTOR OF RELIABILITY, FEDERAL ENERGY REGULATORY COMMISSION; PATRICIA HOFFMAN, ACTING ASSISTANT SECRETARY, OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY; SEAN MCGURK, DIRECTOR, CONTROL SYSTEMS SECURITY PROGRAM, DEPARTMENT OF HOMELAND SECURITY; CITA FURLANI, DIRECTOR, INFORMATION TECHNOLOGY LABORATORY, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY; LOCATION: 311 CANNON HOUSE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, July 21, 2009 Tuesday, 23888 words 405. UNIVERSITY OF HOUSTON'S INFORMATION SECURITY PROGRAM EARNS IMPORTANT DESIGNATION FROM NSA, DHS US Fed News, July 31, 2009 Friday 4:33 PM EST, 1147 words 406. Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Business Wire, August 5, 2009 Wednesday 5:19 PM GMT, 861 words 407. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Network Business Weekly, August 17, 2009, EXPANDED REPORTING; Pg. 23, 925 words 408. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Network Weekly News, August 17, 2009, EXPANDED REPORTING; Pg. 37, 923 words 409. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Internet, Networks & Communications, August 17, 2009, EXPANDED REPORTING; Pg. 25, 928 words 410. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Computers, Networks & Communications, August 20, 2009, EXPANDED REPORTING; Pg. 172, 929 words 411. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Computer Weekly News, August 20, 2009, EXPANDED REPORTING; Pg. 96, 924 words 412. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Computer Business Week, August 20, 2009, EXPANDED REPORTING; Pg. 66, 924 words 413. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple Critical Security Issues in XML Libraries Computer Technology Journal, August 20, 2009, EXPANDED REPORTING; Pg. 89, 926 words 414. Codenomicon Releases the First Security Testing Product for XML; Hacker Halted Booth #308, Miami Hilton Downtown, September 20-25, 2009 Business Wire, September 22, 2009 Tuesday 4:31 PM GMT, 696 words 415. ADDRESS TO E-SECURITY FOR GOVERNMENT 2009 CONFERENCE States News Service, September 23, 2009 Wednesday, 2069 words, States News Service 416. Effective defense requires thorough risk assessment Oil & Gas Journal, September 28, 2009, TRANSPORTATION; Pg. 62, 4363 words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md.. William T. (Tim) Shaw is senior consultant, Cyber SECurity Consulting. In addition, he has held senior positions at Hathaway Corp., EMC Controls, Texas Instruments, and Foxboro Corp. Shaw has more than 30 years' experience in industrial automation, including process-plant automation (DCS and PLC systems), SCADA systems, electrical substation automation, building automation, and factory automation. He holds a BS in electrical and computer engineering from University of Michigan; an MS in engineering science from Loyola College, Baltimore; a PhD in computer science from Kennedy-Western University; and a CISSP certification in cyber security from the IS(C)*. He is a senior member of the Instrument Society of America (ISA) and is also a member of the IEEE Computer Society. 417. SCADA system protection requires independent barriers Oil & Gas Journal, October 5, 2009, TRANSPORTATION; Pg. 68, 2859 words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md. 418. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Telecommunications Weekly, October 7, 2009, EXPANDED REPORTING; Pg. 232, 745 words 419. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Telecommunications Business, October 7, 2009, EXPANDED REPORTING; Pg. 232, 746 words 420. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Computer Business Week, October 8, 2009, EXPANDED REPORTING; Pg. 200, 744 words 421. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Computer Technology Journal, October 8, 2009, EXPANDED REPORTING; Pg. 303, 746 words 422. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Computers, Networks & Communications, October 8, 2009, EXPANDED REPORTING; Pg. 619, 749 words 423. CODENOMICON LTD; Codenomicon Releases the First Security Testing Product for XML Computer Weekly News, October 8, 2009, EXPANDED REPORTING; Pg. 199, 744 words 424. United States : Codenomicon Releases the First Security Testing Product for XML Tendersinfo News, October 9, 2009 Friday 6:30 PM EST, 411 words 425. United States : Codenomicon Releases the First Security Testing Product for XML TendersInfo, October 10, 2009 Saturday, 411 words 426. Ocala-bound tech company likely snags $750K grant Ocala Star-Banner (Florida), October 12, 2009 Monday, STATE AND REGIONAL NEWS, 949 words, Bill Thompson, Ocala Star-Banner, Fla. 427. IQPC's SCADA & Control Systems Security Summit to Feature Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings, Inc. Business Wire, October 26, 2009 Monday 5:41 PM GMT, 322 words 428. New York Public Service Commission Chairman Gary Brown Testifies Before House Energy and Commerce Subcommittee on Energy and Environment - Final FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 4984 words 429. NEW YORK PUBLIC SERVICE COMMISSION CHAIRMAN GARY A. BROWN PREPARED TESTIMONY BEFORE THE HOUSE ENERGY AND COMMERCE SUBCOMMITTEE ON ENERGY AND ENVIRONMENT HEARING ON PROTECTING THE ELECTRIC GRID: H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND H.R. 2195, AS RELEASED BY THE COMMITTEE, Financial Markets Regulatory Wire , October 27, 2009 Tuesday, LOAD-DATE: October 27, 2009 430. House Energy and Commerce Committee, Energy and Environment Subcommittee Holds a Hearing on Electric Grid Security - Final FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 14718 words 431. REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY, CQ Transcriptions , October 27, 2009 Tuesday, COMMITTEE: HOUSE COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON ENERGY AND ENVIRONMENT, LOAD-DATE: October 28, 2009 432. REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY, Financial Markets Regulatory Wire , October 27, 2009 Tuesday, COMMITTEE: HOUSE COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON ENERGY AND ENVIRONMENT, LOAD-DATE: October 28, 2009 433. HEARING OF THE ENERGY AND THE ENVIRONMENT SUBCOMMITTEE OF THE HOUSE ENERGY AND COMMERCE COMMITTEE; SUBJECT: PROTECTING THE ELECTRIC GRID: H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND H.R. 2195, A BILL TO AMEND THE FEDERAL POWER ACT TO PROVIDE ADDITIONAL AUTHORITIES TO ADEQUATELY PROTECT THE CRITICAL ELECTRIC INFRASTRUCTURE AGAINST CYBER ATTACK; CHAIRED BY: REPRESENTATIVE EDWARD MARKEY (D-MA); WITNESSES: JOSEPH MCCLELLAND, DIRECTOR OF THE FEDERAL ENERGY REGULATORY COMMISSION'S OFFICE OF ELECTRIC RELIABILITY; PATRICIA HOFFMAN, PRINCIPAL DEPUTY ASSISTANT SECRETARY IN THE ENERGY DEPARTMENT'S OFFICE OF ELECTRICITY; GARY BROWN, CHAIRMAN OF THE NEW YORK PUBLIC SERVICE COMMISSION; DAVID COOK, VICE PRESIDENT AND GENERAL COUNSEL OF THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION; JOHN DISTASIO, GENERAL MANAGER AND CEO OF THE SACRAMENTO MUNICIPAL UTILITY DISTRICT; LOCATION: 2123 RAYBURN HOUSE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, October 27, 2009 Tuesday, PRESS CONFERENCE OR SPEECH, 19492 words 434. IQPC's SCADA & Control Systems Security Summit Details Updates on Speaker Roster Wireless News, October 29, 2009 Thursday, 259 words 435. Q&A: Why IP is the right choice for Smart Grid; NIST coordinator Arnold explains pros, cons of using Internet standards to upgrade the power grid Network World, October 29, 2009, 1598 words, Carolyn Duffy Marsan 436. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings, Inc. Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365 words 437. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings, Inc. Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365 words 438. Did Hackers Black Out Entire Cities? Intelligence Online, November 12, 2009, GOVERNMENT INTELLIGENCE, 92 words 439. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings, Inc. Health Business Week, November 13, 2009, EXPANDED REPORTING; Pg. 724, 366 words 440. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings, Inc. Law & Health Weekly, November 14, 2009, EXPANDED REPORTING; Pg. 862, 366 words 441. What's the Big Idea: O Canada: Quelling cybersecurity threats The Washington Times, December 10, 2009 Thursday, A, NATION; Pg. 4, 820 words, By James Jay Carafano SPECIAL TO THE WASHINGTON TIMES 442. Siemens Teams With Materials Processing Corp. (MPC) for Secure, Green Recycling of Control Systems; Partnership provides best practice expertise for secure recycling in the United States PR Newswire, December 14, 2009 Monday 11:45 AM EST, 687 words 443. United States : Siemens Teams With Materials Processing Corp. (MPC) for Secure, Green Recycling of Control Systems Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 498 words 444. Germany : Siemens Teams With Materials Processing Corp. (MPC) for Secure, Green Recycling of Control Systems Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 430 words 445. United States : Siemens Teams With Materials Processing Corp. (MPC) for Secure, Green Recycling of Control Systems TendersInfo, December 16, 2009 Wednesday, 477 words, prashant03 446. Germany : Siemens Teams With Materials Processing Corp. (MPC) for Secure, Green Recycling of Control Systems TendersInfo, December 16, 2009 Wednesday, 409 words, datta03 447. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing Corp. MPC for Secure, Green Recycling of Control Systems Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg. 93, 708 words 448. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing Corp. MPC for Secure, Green Recycling of Control Systems Electronics Business Journal, December 30, 2009, EXPANDED REPORTING; Pg. 61, 710 words 449. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing Corp. MPC for Secure, Green Recycling of Control Systems Electronics Business Journal, December 30, 2009, EXPANDED REPORTING; Pg. 61, 710 words 450. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing Corp. MPC for Secure, Green Recycling of Control Systems Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg. 93, 708 words 451. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing Corp. MPC for Secure, Green Recycling of Control Systems Journal of Technology & Science, January 3, 2010, EXPANDED REPORTING; Pg. 273, 711 words 452. Government seizes opportunity to build security into new critical infrastructure Government Computer News, January 13, 2010 Wednesday, 627 words, William Jackson, Government Computer News 453. United States : IT RealityString LLC Launches Anti-Cyberterrorism Campaign Tendersinfo News, January 27, 2010 Wednesday 6:30 PM EST, 328 words 454. United States : IT RealityString LLC Launches Anti-Cyberterrorism Campaign TendersInfo, January 28, 2010 Thursday, 306 words, Mamta03 455. DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors; Oil and gas industry faces the highest rates of victimization, according to Center for Strategic and International Studies Network World, January 28, 2010, 989 words, Ellen Messmer 456. Cyber spies and thugs attacking power-water plants Agence France Presse -- English, January 29, 2010 Friday 4:11 AM GMT, 668 words 457. Reportlinker Adds Smart Grid Cyber Security PR Newswire, February 9, 2010 Tuesday 1:08 PM EST, 2293 words 458. Tip Sheet: George Mason University Experts Available to Discuss Health Data Security/Electronic Medical Records Targeted News Service, February 12, 2010 Friday 6:38 AM EST, 1707 words, Targeted News Service 459. SECURITY WASHINGTON INTERNET DAILY, February 22, 2010 Monday, SECURITY, 283 words 460. Security WASHINGTON INTERNET DAILY, February 22, 2010 Monday, , 283 words 461. HEARING OF THE SENATE COMMERCE, SCIENCE, AND TRANSPORTATION COMMITTEE; SUBJECT: CYBERSECURITY; CHAIRED BY: SENATOR JAY ROCKEFELLER (D-WV); WITNESSES: VICE ADMIRAL MICHAEL MCCONNELL, USN (RET.), EXECUTIVE VICE PRESIDENT, NATIONAL SECURITY BUSINESS, BOOZ ALLEN HAMILTON; JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW, TECHNOLOGY AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES; SCOTT BORG, DIRECTOR AND CHIEF ECONOMIST, U.S. CYBER CONSEQUENCES UNIT; REAR ADMIRAL JAMES ARDEN BARNETT, JR., USN (RET.), CHIEF, PUBLIC SAFETY AND HOMELAND SECURITY BUREAU, FEDERAL COMMUNICATIONS COMMISSION (FCC); MARY ANN DAVIDSON, CHIEF SECURITY OFFICER, ORACLE CORPORATION; LOCATION: 253 RUSSELL SENATE OFFICE BUILDING, WASHINGTON, D.C. Federal News Service, February 23, 2010 Tuesday, CAPITOL HILL HEARING, 19227 words 462. Tech apocalypse: Five doomsday scenarios for IT InfoWorld Daily News, March 15, 2010 Monday, 3974 words, By Dan Tynan, InfoWorld.com 463. Enhancing SCADA and pipeline security Pipeline and Gas Technology, April 1, 2010, OPERATIONS, 1118 words, blank 464. Money trumps security in smart meter rollouts, experts say CNET.com, June 15, 2010 Tuesday 7:00 AM EST, 1877 words, Elinor Mills 465. Intentional EMI leapfrogs modern data center defenses: a look at defenses against sabotage. Mission Critical, July 2010, Pg. 32, 2337 words 466. Intentional EMI leapfrogs modern data center defenses: a look at defenses against sabotage. Mission Critical, July 2010, Pg. 32, 2337 words 467. War in the fifth domain; Cyberwar The Economist, July 3, 2010, FRONT BRIEFING, 2888 words 468. Proof that other countries are planning cyberattacks on the power grid? The Volokh Conspiracy, July 18, 2010 Sunday 12:15 PM EST, 827 words, Stewart Baker 469. Virus targets Siemens industrial control systems CIOL, July 20, 2010 Tuesday 5:05 AM EST, 376 words 470. Computer Weekly, July 20, 2010, NEWS, 236 words, Warwick Ashford 471. United States : Windows Exploit and Default Passwords Put Critical Infrastructure at Risk Tendersinfo News, July 20, 2010 Tuesday 6:30 PM EST, 456 words 472. Windows Exploit and Default Passwords Put Critical Infrastructure at Risk; Sophos finds CPLINK Vulnerability "Trivial to Exploit" And Easy to Adapt for Other Malicious Payloads; Critical Infrastructure Caught Exposed by Widely Available Default Passwords and Questionable Guidance; Business Wire, July 20, 2010 Tuesday 5:43 PM GMT, 603 words 473. United States : Windows Exploit and Default Passwords Put Critical Infrastructure at Risk TendersInfo, July 21, 2010 Wednesday, 435 words, sonu03 474. United States : Flaw uses USB devices as vector to steal data TendersInfo, July 21, 2010 Wednesday, 474 words, roshani03 475. Microsoft Windows flaw may put critical infrastructure at risk Guardian Unlimited, July 22, 2010 Thursday, 459 words, Charles Arthurguardian.co.uk 476. Stuxnet spyware targets industrial facilities, via USB memory stick; Beware the USB memory stick. Infected sticks are the means by which a mystery spyware, dubbed Stuxnet, is penetrating control systems of industrial facilities and utilities around the globe, say cybersecurity experts. The Christian Science Monitor, July 23, 2010 Friday, 1772 words, Mark Clayton Staff writer 477. Friday Summary: July 23, 2010 Securosis, July 23, 2010 Friday 2:12 AM EST, 1422 words 478. Sophos Provides Free Tool to Protect Against Windows '.LNK' Zero-Day Vulnerability Business Wire, July 26, 2010 Monday 2:55 PM GMT, 545 words 479. Computer Weekly, July 27, 2010, NEWS, 321 words, Warwick Ashford 480. Sophos provides free tool against .LNK CIOL, July 27, 2010 Tuesday 10:25 AM EST, 305 words 481. United States : Sophos Blocks Windows Shell Attacks Tendersinfo News, July 27, 2010 Tuesday 6:30 PM EST, 400 words 482. Sophos Blocks Windows Shell Attacks TECHWEB, July 27, 2010 Tuesday 1:08 PM GMT, 387 words 483. Sophos Offers Windows Protection For All But W2K Lockergnome Blog Network, July 27, 2010 Tuesday 11:35 PM EST, 1334 words, the oracle 484. Consultant: Companies running critical infrastructure take months to patch holes FierceCIO, July 28, 2010 Wednesday 4:06 PM EST, 242 words, Caron Carlson 485. Sophos offers free tool for Windows Shortcut flaw Government Computer News, July 28, 2010 Wednesday, 562 words, Kurt Mackie, Government Computer News 486. United States : Sophos Blocks Windows Shell Attacks TendersInfo, July 28, 2010 Wednesday, 378 words, roshani03 487. Black Hat shines light on security (roundup) CNET.com, July 28, 2010 Wednesday 8:42 PM EST, 531 words, CNET News staff 488. Black Hat shines light on security (roundup) CNET.com, July 29, 2010 Thursday 7:11 PM EST, 819 words, CNET News staff 489. Black Hat shines light on security (roundup) CNET.com, July 29, 2010 Thursday 7:11 PM EST, 668 words, CNET News staff 490. Black Hat shines light on security (roundup) CNET.com, July 29, 2010 Thursday 7:11 PM EST, 719 words, CNET News staff 491. 5 Takeaways From Black Hat 2010 PC Magazine.com, July 30, 2010 Friday 5:47 PM EST, SECURITY, 482 words, Larry Seltzer 492. DATA PROTECTION; Windows Exploit and Default Passwords Put Critical Infrastructure at Risk Information Technology Business, August 3, 2010, EXPANDED REPORTING; Pg. 63, 625 words 493. DATA PROTECTION; Windows Exploit and Default Passwords Put Critical Infrastructure at Risk Information Technology Newsweekly, August 3, 2010, EXPANDED REPORTING; Pg. 225, 625 words 494. DATA PROTECTION; Windows Exploit and Default Passwords Put Critical Infrastructure at Risk Computers, Networks & Communications, August 5, 2010, EXPANDED REPORTING; Pg. 880, 626 words 495. Stuxnet 'Zero Day' Worm Not New TECHWEB, August 5, 2010 Thursday 12:27 PM GMT, 420 words 496. Friday Summary: August 6th, 2010 Securosis, August 6, 2010 Friday 2:26 AM EST, 1612 words 497. DATA PROTECTION; Sophos Provides Free Tool to Protect Against Windows '.LNK' Zero-Day Vulnerability Information Technology Newsweekly, August 10, 2010, EXPANDED REPORTING; Pg. 35, 577 words 498. DATA PROTECTION; Sophos Provides Free Tool to Protect Against Windows '.LNK' Zero-Day Vulnerability Information Technology Newsweekly, August 10, 2010, EXPANDED REPORTING; Pg. 35, 577 words 499. Revere Security Executive to Speak at Smart Grid Cyber Security Conference and Expo; Wireless Security Expert Examines Encryption, Authentication Technologies Business Wire, August 10, 2010 Tuesday 5:50 PM GMT, 581 words 500. Opinion: IT needs to help secure industrial control systems; Stuxnet exploit exposed disconnect between IT and operators of industrial control systems Network World, August 13, 2010, 843 words 501. Dangerous Deals on Automation Electrical Marketing, August 13, 2010, Pg. 2, 745 words, Frank Hurtte 502. Malware Threats Increasing Exponentially, McAfee Report Says Defense Daily, August 13, 2010 Friday, 1128 words 503. Malware Threats Increasing Exponentially, McAfee Report Says Terror Response Technology Report, August 18, 2010 Wednesday, 1032 words 504. REVERE SECURITY; Revere Security Executive to Speak at Smart Grid Cyber Security Conference and Expo Telecommunications Business, August 25, 2010, EXPANDED REPORTING; Pg. 80, 609 words 505. REVERE SECURITY; Revere Security Executive to Speak at Smart Grid Cyber Security Conference and Expo Telecommunications Weekly, August 25, 2010, EXPANDED REPORTING; Pg. 143, 608 words 506. REVERE SECURITY; Revere Security Executive to Speak at Smart Grid Cyber Security Conference and Expo Computers, Networks & Communications, August 26, 2010, EXPANDED REPORTING; Pg. 503, 612 words 507. REVERE SECURITY; Revere Security Executive to Speak at Smart Grid Cyber Security Conference and Expo Computers, Networks & Communications, August 26, 2010, EXPANDED REPORTING; Pg. 503, 612 words 508. If this man wanted to blow up Dublin ... he could Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words 509. If this man wanted to blow up Dublin ... he could Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words 510. Work: Crash diet: A working life The computer virus expert: Every day, Patrick Fitzgerald fights off internet infections, worms, malware ... or even spam zombies. He tells Mark King about the battle against cyber crime. The Guardian (London) - Final Edition, August 28, 2010 Saturday, GUARDIAN WORK PAGES; Pg. 3, 1640 words, Mark King 511. Electric power industry as critical infrastructure Network World, September 6, 2010, 1108 words, M. E. Kabay 512. Attacks on power systems: Data leakage, espionage, insider threats, sabotage Network World, September 8, 2010, 1554 words, M. E. Kabay 513. Questions & Answers Regarding New Echelon Control System Open Software Platform, Edge Control Node Extensible Hardware, and Duke Energy Business Wire, September 8, 2010 Wednesday 2:15 PM GMT, 5364 words 514. Cyber security a growing concern in energy sector. Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 841 words, Lynn Moore, Postmedia News 515. Cyber security a growing concern in energy sector Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 834 words, Lynn Moore, Postmedia News 516. Grids under hack alert; As North America's electricity grid moves toward a "smart grid" system, the cyber spies, thieves or terrorists determined to attack that grid are sure to get smarter themselves, industry experts warn Canwest News Service, September 10, 2010 Friday 11:00 AM EST, 1144 words, Lynn Moore, Postmedia News 517. Grids under hack alert National Post's Financial Post & FP Investing (Canada), September 11, 2010 Saturday, FINANCIAL POST INVESTING; Pg. FP12, 1138 words, Lynn Moore, Postmedia News 518. Guarding the grid; Keeping electrical systems secure is a key challenge of the energy industry Canwest News Service, September 11, 2010 Saturday 10:01 AM EST, 1234 words, LYNN MOORE, Montreal Gazette; The Gazette 519. Guarding the grid; Keeping electrical systems secure is a key challenge of the energy industry The Gazette (Montreal), September 11, 2010 Saturday, BUSINESS: WORLD ENERGY CONGRESS; Pg. C1, 1234 words, LYNN MOORE, The Gazette 520. Grids under hack alert; As North America's electricity grid moves toward a "smart grid" system, the cyber spies, thieves or terrorists determined to attack that grid are sure to get smarter themselves, industry experts warn Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1146 words, Lynn Moore, Postmedia News 521. Grids under hack alert; As North America's electricity grid moves toward a "smart grid" system, the cyber spies, thieves or terrorists determined to attack that grid are sure to get smarter themselves, industry experts warn Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1144 words, Lynn Moore, Postmedia News 522. Attacks on power systems: Hackers, malware Network World, September 13, 2010, 1550 words, M. E. Kabay 523. Power plays; Cyber security a growing concern in energy sector Prince George Citizen (British Columbia), September 13, 2010 Monday, NEWS; Pg. 8, 839 words, Lynn Moore, Postmedia News 524. Attacks on power systems: Industry/government consensus Network World, September 15, 2010, 1071 words, M. E. Kabay 525. Stuxnet worm wreaks havoc among industrial firms vnunet.com, 18 September 2010 Saturday, 279 words, Phil Muncaster 526. Increasing security of SCADA systems in power industry Network World, September 20, 2010, 1263 words, M. E. Kabay 527. OTN's solutions are reliable, secure and easy to use Oil & Gas News, September 21, 2010, 1051 words 528. A laundry list of power industry incidents to learn from Network World, September 22, 2010, 1628 words, M. E. Kabay 529. Software smart bomb fired at Iranian nuclear plant: experts Agence France Presse -- English, September 24, 2010 Friday 1:51 AM GMT, 639 words 530. A New Kind of Software Attack, A Whole New Ballgame The Cutter Blog, September 24, 2010 Friday 1:46 PM EST, 608 words, Ken Orr 531. Stuxnet worm is the 'work of a national government agency' Guardian Unlimited, September 24, 2010 Friday, 1223 words, Josh Hallidayguardian.co.uk 532. Stuxnet computer worm takes its toll on Iran, where nuclear plant may be target VentureBeat, September 26, 2010 Sunday 1:32 AM EST, 322 words, Dean Takahashi 533. Virus Targets Industrial OS, Reaches Iran's Nuclear Plant ReadWriteWeb, September 27, 2010 Monday 4:00 PM EST, 552 words, Curt Hopkins 534. Web 'superbug' threatens Chinese national security: report The Press Trust of India, September 27, 2010 Monday, NATIONWIDE INTERNATIONAL NEWS, 382 words 535. WEB 'SUPERBUG' THREATENS CHINESE NATIONAL SECURITY REPORT The Statesman (India), September 27, 2010 Monday, 516 words 536. Stuxnet mutating, rampaging through Iran: IT official Agence France Presse -- English, September 27, 2010 Monday 10:57 AM GMT, 443 words 537. Stuxnet wreaking havoc on industrial equipment in Iran Times of Oman, September 28, 2010 Tuesday, 383 words, AFP 538. Is cyberwarfare a genuine threat? Guardian Unlimited, September 30, 2010 Thursday, 433 words, Charles Arthurguardian.co.uk 539. PandaLabs Q3 Report: Trojans Constituted More Than Half of All New Threats; 95 Percent of Email was Spam; - Email infections decline as exploits propagated via social media increase PR Newswire, September 30, 2010 Thursday 8:00 AM EST, 803 words 540. Cyber worm hits Chinese industry - Hong Kong paper BBC Monitoring Asia Pacific - Political Supplied by BBC Worldwide Monitoring, September 30, 2010 Thursday, 1104 words 541. Superbug that attacked 6 mn computers in China traced to US The Press Trust of India, October 1, 2010 Friday, NATIONWIDE INTERNATIONAL NEWS, 363 words 542. A worm in the centrifuge; The Stuxnet outbreak The Economist, October 2, 2010, INTERNATIONAL, 953 words 543. Indian websites targeted by internet worms; China suspected; Experts believe that Chinese hackers are most likely to have written the worm which has terrorised the world since June Accord Fintech, October 11, 2010 Monday 10:14 AM EST, 242 words 544. 2010 Institutional Investor Conference Webcast - Final FD (Fair Disclosure) Wire, October 13, 2010 Wednesday, 30839 words _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Lexis search for "scada + hackers" 1996-2010 -- 544 citations Shawn Merdinger (Oct 23)