Taking a look at SCADA vulnerabilities and how to prevent future exploits and malware.