Retrofitting cybersecurity

In 1982, long before a cybersecurity threat to control system networks was widely recognised, a Trojan horse attack on control system software reportedly caused a huge explosion in a Siberian gas pipeline. Even now, many systems that have been retrofitted for compatibility with the Industrial Internet of Things (IIoT) are not well protected.

Read more

Cost of a cyber security breach reaches a record high as Canadian businesses spend up to $5.8mn to recover

Cyber security incidents have become the new normal for Canadian companies, with 100% of organisations experiencing attacks, according to the findings of a new study from Scalar Decisions Inc. of more than 400 Canadian IT and security workers.

Read more

Government acts to protect essential services from cyber attack

Bosses of Britain’s most critical industries are being warned to boost cyber security or face hefty fines for leaving themselves vulnerable to attack. Energy, transport, water and health firms could be fined up to £17 million (€19.37 million) if they fail to have the most robust safeguards in place against cyber attack.

Read more

Survey reveals 32% of C-Suite have no response plan for cyberattacks or don’t know if they have one

Nearly a third of C-Level directors surveyed across the UK (32%) either do not have a response plan in place to manage a cyber-attack on their business, or they are not sure whether they do.

Read more

Connected complexity could see rise in recalls

The WannaCry ransomware attack this week shocked the world, and the ripples will be felt for months to come. It demonstrates that cyber criminals are stepping up their campaigns and one sector increasingly at risk is autonomous vehicles.

Read more

Quantum computing will impact the ecosystem of the IoT for industrial use

A growing number if IT companies are working on developing new computing models equipped with innovative interaction methodologies that guarantee secure communications between humans, sensors and data analysis platforms.

Read more

Industrial IoT: Walk before you can run

Successful IoT projects are security driven and focused on business needs, says Ben Boswell, UK & Ireland director of World Wide Technology.

Read more

Companies react as UK cyber security boss accuses them of peddling ‘witchcraft’ to sell more products

Computer security companies have been accused of “massively” exaggerating the abilities of malicious hackers. Dr Ian Levy, technical director of the UK’s National Cyber Security Centre, made the accusation in a speech this week reported by The Register.

Read more

Norwegian researchers show how to hack and drive a Tesla car through its app

Research by Norwegian app security firm Promon has demonstrated that, by exploiting a lack of security in the Tesla smartphone app, cybercriminals could take control of the company’s vehicles. They have shown they can locate, unlock and drive the car away unhindered.

Read more

Three ways the energy sector is transforming with the Internet of Things

The Internet of Things (IoT) has brought digital connectivity to the physical world, disrupting both industrial business practices and the ways in which consumers interact with these organisations.

Read more

MWR InfoSecurity issues practical advice on building a secure LoRa solution

Speaking at The Symposium on Security for Asia Network (SyScan) in Singapore, Rob Miller, senior security consultant at MWR InfoSecurity, has detailed how to build LoRa systems that are provably secure against cyber-attack.

Read more

Vectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks

Vectra® Networks, reports that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors.

Read more

Vectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks

Vectra® Networks has announced that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors, enabling potential attackers to remotely command and control a cyber attack without being detected by traditional security products.

Read more

A look back at SCADA security in 2015

It should come as no surprise that Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that control key functions in critical infrastructure are especially at risk of cyber attack. If saboteurs manage to compromise critical infrastructure services, a country’s economy and military defenses can be severely hampered.

Read more

Do IT security professionals have the tools and CxO support to prevent cyber-attacks on the IoT?

According to several IoT industry analysts, IT security professionals are not confident that they can prevent cyber-attacks on the Internet of Things. Not only do companies still need to get their data security houses in order, the market for data security products is frustratingly being described by one analyst firm as “immature”. Jeremy Cowan reports.

Read more

Top Wireless Gotchas! Number Three: Mitigating security risks

Blog — This is the third post in a multi-part series of blogs by Bill Zujewski, which specifically explores the challenges of dealing with wireless technology as part of an M2M (Machine-To-Machine) initiative. The series offers insights to help designers and developers prepare for and overcome the unique challenges involved with implementation. Today’s post focuses

Read more