<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Yacht - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/yacht/</link><description>Yacht - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Tue, 09 Jun 2020 08:48:52 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/yacht/" rel="self" type="application/rss+xml"/><item><title>Naval Dome provides cyber defense for a yacht</title><link>https://maritimeinfosec.org/naval-dome-provides-cyber-defense-for-a-yacht/</link><pubDate>Tue, 09 Jun 2020 08:48:52 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/naval-dome-provides-cyber-defense-for-a-yacht/</guid><description><![CDATA[<p>Naval Dome, an Israeli company, announced that it has equipped a luxury yacht (MY Lucky Me) with its maritime cybersecurity solution.</p>
<figure>
</figure>

<p>According to the company, the solution includes host-level protection (<em>endpoint protection</em>) combined with cloud-based cybersecurity capabilities (<em>cloud-based solution</em>). Nothing particularly revolutionary at first glance, but what stands out most is the integration approach: rather than operating in isolated silos, the solution appears to cover both IT and OT systems on board. That is clearly the direction the sector should be moving toward.</p>]]></description></item><item><title>Hack.lu 2018: how to hack a yacht</title><link>https://maritimeinfosec.org/how-to-hack-a-yacht-hack-lu-2018/</link><pubDate>Fri, 14 Dec 2018 13:38:41 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/how-to-hack-a-yacht-hack-lu-2018/</guid><description><![CDATA[<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
      <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="allowfullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube-nocookie.com/embed/_6MXtNMds3w?autoplay=0&amp;controls=1&amp;end=0&amp;loop=0&amp;mute=0&amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"></iframe>
    </div>

<p>This video was recorded during the well-known hack.lu 2018 conference in Luxembourg. In the first part, Stephan Gerling presents his view of maritime information systems and briefly discusses services such as GPS and AIS. He then focuses on ship-to-shore connectivity, particularly satellite communications.</p>
<p>He goes on to demonstrate design vulnerabilities in the control interface of a “naval” router. The management interface connects to the router via FTP, and the credentials and passwords are stored in clear text, making it easy to retrieve the WLAN credentials of the system.</p>]]></description></item><item><title>Superyachts: an easy target for modern-day pirates?</title><link>https://maritimeinfosec.org/superyachts-an-easy-target-for-modern-day-pirates/</link><pubDate>Fri, 14 Dec 2018 08:05:31 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/superyachts-an-easy-target-for-modern-day-pirates/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2018/12/mega-yacht-905520_640.jpg" referrerpolicy="no-referrer">
            </div><p>The new generation of “superyachts” is booming (even if I do not personally own one), and unsurprisingly they are not escaping the broader digital transformation of the maritime sector. With the financial resources typical of the ultra-luxury market, there are effectively very few limits to the technologies installed on board.</p>
<p>High-bandwidth multi-operator satellite connections, GSM and 4G relays (and beyond), Wi-Fi networks, full-coverage onboard video surveillance, highly sophisticated entertainment systems, alarm systems, state-of-the-art bridge and engine systems, and extensive automation: these vessels are not designed solely for leisure. Many owners and charterers effectively relocate part of their business operations to the yacht. In that sense, the yacht should be viewed as an extension of the company itself—yet often a far more vulnerable one. It may lack many of the cybersecurity safeguards present in corporate environments, and the specific constraints of the maritime environment are sometimes poorly understood by corporate CISOs.</p>]]></description></item><item><title>Derbycon 2018: Ship hacking — a primer for today's pirate</title><link>https://maritimeinfosec.org/ship-hacking-a-primer-for-todays-pirate/</link><pubDate>Thu, 25 Oct 2018 13:27:55 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ship-hacking-a-primer-for-todays-pirate/</guid><description><![CDATA[<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
      <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="allowfullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube-nocookie.com/embed/bTOYHKB9IKM?autoplay=0&amp;controls=1&amp;end=0&amp;loop=0&amp;mute=0&amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"></iframe>
    </div>

<p>Presentation delivered during the Derbycon 2018 conference.</p>]]></description></item></channel></rss>