Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
mobile phone and robot arm

Mobile SCADA application landscape less secure than in 2015

Posted on January 12, 2018January 12, 2018 By Davey Winder

In two years, SCADA security has worsened to the tune of an average increase of 1.6 vulnerabilities per application tested

IOActive and Embedi security researchers looked at the security of mobile SCADA apps back in 2015 and security was not brilliant. They have now repeated that research, and oh boy are things getting worse. So what’s going wrong, and why isn’t security getting better in this supposedly cyber-aware era?

When the original research was conducted during Black Hat 2015, ‘only’ 50 issues were found across 20 such mobile SCADA applications. Yet the publication of a new whitepaper today by researchers at IOActive and Embedi, reveals 147 security vulnerabilities across 34 mobile applications used with Supervisory Control and Data Acquisition (SCADA) systems. The latest research suggests, within just two years, the security situation has got worse to the tune of an average increase of 1.6 vulnerabilities per application tested.

Click here to read complete article

Threatscape Tags:Analysis, News, Research, SCADA

Post navigation

Previous Post: Why are cyber-criminals dumping Bitcoin?
Next Post: KillaMuvz pleads guilty to being a sophisticated malware operator

Related Articles

Is ChatGPT a security threat? I asked, the AI bot replied. Analysis
Google Confirms Chrome Zero-Day #5 As Attacks Begin, Update Now News
Windows 10, 11 & Server Zero-Day Attacks Underway, Microsoft Says News
Microsoft Confirms Windows Users Targeted By 0Day Hack News
Who is Trickbot? EXCLUSIVE: Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks Analysis
cartoon police in front of cyber crime tape Hack The Police: Here’s How Threat Actors Target Law Enforcement In 2022 Cybercrime

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government hack Hackers Hacking healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Threatscape Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2023 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy