Menu
Menu
Who's hacking your refrigerator?

Who's hacking your refrigerator?

Your friendly guide to understanding cause and effect in process control system hacks

Now that everything's networked and process control systems are easy to hack, here's a quick-reference guide to figuring out who's behind each type of security incident.

EFFECT

CAUSE

All dams east of the Mississippi open simultaneously

China

All bank vaults east of the Mississippi open simultaneously

Mafia

Your car starts broadcasting your emails and voice mails at random intervals

Anonymous

Local Redbox only dispenses porn

Malicious computer science majors

Toilets in middle school flush continuously

Bored middle schoolers

Wii controller can be used to make your fridge dispense lemonade ice cubes

Your kids (duh)

Read more about critical infrastructure in CSOonline's Critical Infrastructure section.

Other stories by Derek Slater

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Show Comments
Computerworld
ARN
Techworld
CMO