blog trackingRealtime Web Statistics Plant Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘plant’

Pennsylvania nuclear plant worker to trial for child pornography police found on work computer

A former western Pennsylvania nuclear plant worker has been ordered to stand trial on charges he downloaded child pornography pictures on his work computer because he was bored.

The Beaver County Times (http://bit.ly/1l8UMkE ) reports 60-year-old Raymond Fischer Jr., of Harmony, will stand trial in May now that he waived a preliminary hearing last week.

FirstEnergy Corp. says the company promptly reported the images when they were found in October 2013, and fired Fischer from the Beaver Valley Nuclear Power Station three days later.

The state police Bureau of Criminal Investigation says 51 printed images of children ages 10 to 16 were found in Raymond Fischer Jr.

Read More

The post Pennsylvania nuclear plant worker to trial for child pornography police found on work computer appeared first on Parent Security Online.

View full post on Parent Security Online

Cyber-physical attacks: Hacking a chemical plant

Source: National Cyber Security – Produced By Gregory Evans

When it comes to hacking chemical plants, for an attacker to go hackedity-hack-hack and then the plant goes boom fortunately only happens in the movies. But “if you plan to improve your financial posture” now and at least in the five years is a good time for security researchers to jump into cyber-physical systems security where you will be most concerned about attacks that cause physical damage. Granted, you and attackers may know a lot about the IT world, and even Industrial Control Systems (ICS) aka SCADA, but hacking a chemical plant means also needing to know some physics, chemistry and engineering. The Damn Vulnerable Chemical Process was developed to help you master new skills; it’s the “first open source framework for cyber-physical experimentation based on two realistic models of chemical plants.” At Def Con 23, Marina Krotofil, senior security consultant at the European Network for Cyber Security, and Jason Larsen, principal security consultant at IOActive, presentedRocking the pocket book: Hacking chemical plants for competition and extortion; you can grab a copy of their presentation (pdf) and slides (pdf) as the duo delved into a complete attack, from start to finish, on a simulated plant for Vinyl Acetate production. Pulling […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber-physical attacks: Hacking a chemical plant appeared first on National Cyber Security.

View full post on National Cyber Security

FEMA to evaluate Maryland’s preparedness to respond to emergency at nuke plant

Top Priority Sector:  disaster_preparedness_emergency_response Image Caption:  Calvert Cliffsnuclear plant inState of Maryland Read More….

View full post on The Cyber Wars

FEMA updates its guide for nuclear plant alerts and notifications

Jacob Goodwin Top Priority Sector:  infrastructure_protection Read More….

View full post on The Cyber Wars

NRC keeps an eye on NJ nuclear plant that sounded warning during storm

Mark Rockwell Top Priority Sector:  disaster_preparedness_emergency_response Image Caption:  Oyster Creek Federal nuclear regulators continue to monitor a nuclear power plant on New Jersey’s Barnegat Bay that declared an alert as Hurricane Sandy came ashore in the state. The official alert, issued by the Oyster Creek plant owned by Excelon Corp. located near Lacey Township in […]

View full post on The Cyber Wars

Legislation takes aim at overlapping nuclear plant licensing renewals

Mark Rockwell Top Priority Sector:  cbrne_detection Image Caption:  Seabrook Station Citing the safety of aging nuclear power plants, two congressmen introduced legislation on Sept. 26 that would prevent overlapping operating license renewals for the facilities. The legislation would prevent nuclear reactor owners from applying for 20-year license renewal years before their original 40-year operations license […]

View full post on The Cyber Wars

ICS-CERT issues alert on power plant control system

Mark Rockwell Top Priority Sector:  cyber_security A control system used by electrical power plants could have a vulnerability that leaves a back door open for hackers to get into the system, according to DHS’ critical infrastructure Cyber protection team. The vulnerability in the Rugged Operating System, made by Siemens subsidiary RuggedCom, was found by researcher […]

View full post on The Cyber Wars

Applied DNA Sciences expands plant and personnel

Top Priority Sector:  access_control_identification Applied DNA Sciences, Inc., a provider of DNA-based anti-counterfeiting technology, announced on August 8 that it has significantly expanded its office, production and laboratory space and increased its personnel. Homepage position:  10 read more View full post on Government Security News

View full post on The Cyber Wars

Sr. Manufacturing Plant Engineer in US-OK-Oklahoma City

Company: National Recruiting Experts. Posted on May-08-12.
View full post on Latest Tech Jobs from Dev Bistro

View full post on National Cyber Security

Page 1 of 3123»

My Twitter

  • RT @GregoryDEvans: You can discover more about a person in an…. https://t.co/3nEj7dXIrc https://t.co/d0NhYHa4ht
    about 7 hours ago
  • You can discover more about a person in an…. https://t.co/aoChTUpZau #dating @gregorydevans
    about 7 hours ago
  • Anelisa’s body found https://t.co/GKI5i7k97T #dating @gregorydevans
    about 7 hours ago
  • I canceled my home Internet — and got more connected to the people around me https://t.co/PdMdLiB48q #dating @gregorydevans
    about 7 hours ago
  • No need looking for ‘the perfect’ man — look for 3 https://t.co/GzM7Qw3KZq #dating @gregorydevans
    about 8 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans