Breaking down ICONICS' SCADA vulnerabilities
Vulnerabilities, including a proof-of-concept exploit code, are out in the industry for ICONICS' GENESIS32 and GENESIS 64.
Vulnerabilities, including a proof-of-concept (PoC) exploit code, are out in the industry for ICONICS' GENESIS32 and GENESIS 64, and while some of the vulnerabilities may appear trivial, in the hands of an experienced hacker it could lead to serious repercussions.
Read more here.
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.