Remove 2017 Remove Healthcare Remove Military Remove Phishing
article thumbnail

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

The Last Watchdog

And by compromising activities on the IT side, stealing credentials, deploying phishing emails, and infecting websites with drive-by malware, criminals can infiltrate the OT network. Countries with limited military might and financial resources can create a more level battleground for themselves by engaging in cyber battles.

Military 147