NSW State Water begins massive IT overhaul 
By Allie Coyne | Apr 22, 2014 | Comment Now 
Program worth $30.2 million.
 
Large Hadron Collider used vulnerable SCADA system 
 
SCADA systems found to be woefully insecure 
By Darren Pauli | Jan 10, 2014 | Comment Now 
Over 60,000 exposed control systems found online.
 
Hackers gain 'full control' of critical SCADA systems 
By Darren Pauli | Jan 10, 2014 | Comment Now 
Over 60,000 exposed control systems found online.
 
DEADLY NINJA Stuxnet the first to attack Iran nuclear plant 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Copycat weapons not limited to nation-states, boffin says.
 
Qld traffic systems vulnerable to G20 attack  
By Paris Cowan | Nov 20, 2013 | Comment Now 
Just 12 months out from gathering of world leaders.
 
Critical flaws found in Brisbane traffic systems 
By Paris Cowan | Nov 20, 2013 | Comment Now 
Failures found ahead of G20 Summit.
 
WA struggles to justify smart water meters 
By Paris Cowan | Nov 14, 2013 | Comment Now 
Water is just too cheap.
 
Chinese hackers attack honeypot water utility 
 
Chinese hackers take over fake water utility 
 
John The Ripper cracks Siemens PLC passwords 
May 14, 2013 | Comment Now 
Tool gets a facelift.
 
Honeypot lures SCADA and PLC hackers 
By Danielle Walker | Mar 19, 2013 | Comment Now 
Most attacks traced to China.
 
Chevron appoints network designer for Wheatstone LNG 
By Ry Crozier | Feb 19, 2013 | Comment Now 
Complex supplier mix gets more complex.
 
Sydney Water drafts NICTA into pipe break project 
By Ry Crozier | Feb 13, 2013 | Comment Now 
Predictive analysis of water infrastructure.
 
Virus shutters US power plant 
Jan 17, 2013 | Comment Now 
Facility pushed off line for three weeks.
 
Video: Inside Victoria's desalination plant control centre 
By Ry Crozier | Dec 20, 2012 | Comment Now 
Contractor open doors on contract milestone.
 
Yarra Valley Water brings IT in-house 
By Liz Tay | Dec 5, 2012 | Comment Now 
Shaves 10 percent off IT spend.
 
SCADA software exposed for zero-day holes 
By Dan Raywood | Dec 3, 2012 | Comment Now 
Researchers have field day with finds.
 
Twenty-three zero day holes found in SCADA systems 
By Dan Raywood | Nov 29, 2012 | Comment Now 
Systems open to remote code execution, denial of service attacks.
 
Chevron Wheatstone LNG control systems chosen 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 404

Vote