GE designs massive floating turbine to take wind energy into deep water

While offshore wind farms continue to play a growing part in the renewable energy mix, particularly in the US which recently approved its first major facility off the coast of Massachusetts, there remains a lot of untapped potential in the winds blowin… Continue reading GE designs massive floating turbine to take wind energy into deep water

Massive 853-foot-tall wind turbines are coming to America’s East Coast

America’s first “commercial scale” offshore wind energy project has decided to use GE’s colossal Haliade-X turbines, the world’s largest and most powerful. Standing 853 ft (260 m) high – as tall as an 85-story building – with a 722-foot (220 m) rotor, … Continue reading Massive 853-foot-tall wind turbines are coming to America’s East Coast

A Clock From An Electricity Meter

Electric utilities across the world have been transitioning their meters from the induction analog style with a distinctive spinning disc to digital “smart” meters which aren’t as aesthetically pleasing but do have a lot of benefits for utilities and customers alike. For one, meter readers don’t need to visit each …read more

Continue reading A Clock From An Electricity Meter

Canon Data Breach Affects General Electric’s Current and Former Employees

General Electric (GE) has revealed that a data breach at Canon Business Process Services (Canon), one of the company’s service providers, exposed details about GE employees, former employees, and other beneficiaries. Just because the world seems … Continue reading Canon Data Breach Affects General Electric’s Current and Former Employees

Widely available ICS attack tools lower the barrier for attackers

The general availability of ICS-specific intrusion and attack tools is widening the pool of attackers capable of targeting operational technology (OT) networks and industrial control systems (ICS). “As ICS are a distinct sub-domain to information… Continue reading Widely available ICS attack tools lower the barrier for attackers

How Pivotal got bailed out by fellow Dell family member, VMware

When Dell acquired EMC in 2016 for $67 billion, it created a complicated consortium of interconnected organizations. Some, like VMware and Pivotal, operate as completely separate companies. They have their own boards of directors, can acquire companies and are publicly traded on the stock market. Yet they work closely within the Dell, partnering where it […] Continue reading How Pivotal got bailed out by fellow Dell family member, VMware

Researchers warn of critical vulnerability in GE anesthesia machines

A flaw in the firmware of anesthesia and respiratory devices made by General Electric could allow a hacker to change the composition of gases dispensed by the equipment, putting patients at risk, cybersecurity researchers warned Tuesday. “If exploited, this vulnerability could directly impact the confidentiality, integrity and availability of device components,” CyberMDX, the health care security company that discovered the issue, said in a statement. For the vulnerability to be exploited, a hacker would need access to a hospital’s network and for the machines to be connected to a terminal server, or one that allows enterprises to connect to multiple systems, according to CyberMDX. But with that access, an attacker could not only alter gas composition, the researchers said, but also silence alarms on the equipment and change dates and timestamps that document a patient’s surgery. “Once the integrity of time and date settings has been compromised, you no longer […]

The post Researchers warn of critical vulnerability in GE anesthesia machines appeared first on CyberScoop.

Continue reading Researchers warn of critical vulnerability in GE anesthesia machines