US ballistic missile systems have very poor cyber-security
No data encryption, no antivirus programs, no multifactor authentication mechanisms, and 28-year-old unpatched vulnerabilities are just some of the cyber-security failings described in a security audit of the US’ ballistic missile system released on Friday by the US Department of Defense Inspector General
https://www.zdnet.com/article/us-ballistic-missile-systems-have-very-poor-cyber-security/

The US ballistic missile system is a cybersecurity nightmare
The auditors also found that three of the five missile locations didn’t apply patches for vulnerabilities discovered years and years ago, even as far back as 1990. In addition, at least one team didn’t protect their computers with an anti-virus or any other security product that can block intruders.
https://www.engadget.com/2018/12/18/us-ballistic-missile-system-cybersecurity/

Delivering security and continuity for the cities of tomorrow
It is clear that the future benefits of IoT-enabled cities are enormous. However, these benefits come with a significant array of challenges and risks, one being security. Though city administrators undoubtedly attempt to prevent attacks, we would be naive to ignore the possibility of something falling through the cracks. History has shown us that security measures that have even the smallest of vulnerabilities will be quickly identified and exploited by criminals and smart cities are no different.

Delivering security and continuity for the cities of tomorrow

Automotive Security: It’s More Than Just What’s Under The Hood
The vulnerabilities that have come to light in the past four-to-five years are significant, but also generally harder to exploit for the average attacker. Over the past decade, vehicles have become even more digitally connected – with many of them now including always-on 4G connectivity. While driver and occupant safety have always been of paramount concern, the new technology has had its fair share of attention given to it, but not enough.
https://threatpost.com/automotive-security-its-more-than-just-whats-under-the-hood/139987/

Iranian APT Group Pegged for Shamoon Disk Wiping Attacks
The attacks targeted several energy, telecoms and government organizations in the Middle East, often via suppliers in Europe. They include version 3 of Shamoon, a malware family first used in the infamous destructive attack on Saudi Aramco in 2012 which wiped over 30,000 machines
https://www.infosecurity-magazine.com/news/iranian-apt-group-shamoon-disk/