A troubling cyberattack that hit a petrochemical company in August 2017 could be replicated around the world, including America.
Backstory: Last fall, it was revealed that malware called Triton was used to shut down operations at an industrial plant in the Middle East. It later emerged that the attack used all-new software to hijack critical safety systems. It’s still unclear who was behind the attack.
What’s new: The New York Times says unnamed government officials and security experts believe the culprits “were sophisticated and had plenty of time and resources,” suggesting they “were most likely supported by a government.” The newspaper also claims the attack was meant to result in an explosion, but a flaw in the code stopped it from happening.
Why it matters: The attack hit industrial controller systems that are, according to the Times, used in “around 18,000 plants around the world, including nuclear and water treatment facilities, oil and gas refineries, and chemical plants.” Security expert James A. Lewis tells the newspaper that hackers could “deploy the same technique here in the United States.”
What’s next for the world’s fastest supercomputers
Scientists have begun running experiments on Frontier, the world’s first official exascale machine, while facilities worldwide build other machines to join the ranks.
The future of open source is still very much in flux
Free and open software have transformed the tech industry. But we still have a lot to work out to make them healthy, equitable enterprises.
The beautiful complexity of the US radio spectrum
The United States Frequency Allocation Chart shows how the nation’s precious radio frequencies are carefully shared.
How ubiquitous keyboard software puts hundreds of millions of Chinese users at risk
Third-party keyboard apps make typing in Chinese more efficient, but they can also be a privacy nightmare.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.