- The attackers appeared to use Internet Explorer to access the Human-Machine Interface (HMI). This is because the attack was linked to a vulnerability found in Internet Explorer. The vulnerability, ...
When a process plant suffers a catastrophic failure that costs lives, where does the blame lie? With the operators who may have been among the casualties and can't speak for themselves? Or the HMI ...