Virtual pirates at large on the cyber seas
CyberKeel has just released a whitepaper analysing the current status of cyber risks and cyber security in the industry
Read moreCyberKeel has just released a whitepaper analysing the current status of cyber risks and cyber security in the industry
Read moreNew technologies open up new opportunities for the criminals The Skuld P&I Club has issued an Advisory to inform about the increasing risk of fraud and crime in the shipping industry. New technologies have opened up new opportunities for the criminals; shipping is now entering the age of cyber crime.The challenge for ship owners is even more complex because cyber criminals are targeting diverse facets of the shipping industry. For example, there was a well-documented case of drug smugglers subverting an IT system at a major port in order to facilitate the smuggling of contraband in containers.The rise of targeted piracy and drug smuggling reflects how criminal organizationshave become more sophisticated. They will seek detailed intelligence on potentialtargets and will use modern technology to source information and data to assist intheir planning and execution of criminal ventures. Drug traffickers, drug and peoplesmugglers, pirates and fraudsters of all stripes are taking every opportunity to gaininformation that they can turn to their advantage.While shipping and logistics companies are expert at maritime transport, they maynot have the same experience with IT security. It will be essential to invest time,effort and capital into security measures to ensure these cyber risks areappropriately managed. Companies leave ...
Read moreBernard Twomey and Jonathan Earthy of Lloyd's Register Marine addressed the London Joint Hull Committee on the risks associated with marine technology
Read moreGAO has issued a report regarding maritime critical infrastructure protection and the need for better port cybersecurity
Read moreIncreased Internet and remote connectivity to offshore assets has exposed their industrial control systems to targeted attacks and vulnerabilities previously obscured.
Read more