glblgeopolitics.wordpress.com
Hackers Turn Ukrainian Infrastructure into ‘Powder Keg’
For more information on SCADAs, their vulnerabilities and exploitations, please see the SCADA tag. An example article showing American vulnerability to SCADA attacks: UPDATE 3: U.S. probes cyber at…