Infected Peripheral Devices

hardware access control IoT security

As part of an academic security research that included the scanning of repositories of files, researchers came across classified operational documents that belonged to a large natural gas utility operator. When approached by the researchers, the utility’s security team was surprised to discover that the documents were authentic and there was no internal evidence that had been taken out.

Download Case Study
  • Previous Post

    Critical Infrastructure Risks

  • Next Post

    Invisible Network Devices