Using a common metal found in self-cleaning ovens, it may soon be possible to concentrate solar energy and use it to efficiently convert carbon dioxide and water into fuel.
It is no secret oil and gas companies face cyber security threats on a daily basis, but the level of the attack are becoming more sophisticated and well-organized through criminal syndicates and terrorist groups, according to a new report
Wellintech, the Chinese software provider that publishes KingView, a very popular supervisory control and data acquisition (SCADA) program in China, issued a patch for a vulnerability that could affect a plant’s production processes.
Engineering workers at the nuclear power plant near Berwick, PA, detected a design flaw in a temperature control system that could have shut down the two reactors, the Nuclear Regulatory Commission (NRC) reported.
There is now a way to deploy the next generation Internet Protocol (IPv6) securely.
There is now groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the level of individual systems
The Deepwater Horizon disaster in the Gulf of Mexico occurred off the coast of the United States, but a similar incident could happen anywhere there is offshore drilling.
The failed Deepwater Horizon oil rig relied too heavily on engineers following complex data for long periods of time, instead of providing automatic warning alerts.
A new year always brings with it the possibilities of great things, however it also brings predictions on what the new cyber threats will be for the year.
Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.