Who's hacking your refrigerator?

Your friendly guide to understanding cause and effect in process control system hacks

Now that everything's networked and process control systems are easy to hack, here's a quick-reference guide to figuring out who's behind each type of security incident.



All dams east of the Mississippi open simultaneously


All bank vaults east of the Mississippi open simultaneously


Your car starts broadcasting your emails and voice mails at random intervals


Local Redbox only dispenses porn

Malicious computer science majors

Toilets in middle school flush continuously

Bored middle schoolers

Wii controller can be used to make your fridge dispense lemonade ice cubes

Your kids (duh)

Read more about critical infrastructure in CSOonline's Critical Infrastructure section.

Other stories by Derek Slater

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Brand Page

Stories by Derek Slater

Latest Videos

More videos

Blog Posts