On Friday evening, NCC Group and Cyber Security Challenge UK ran a competition which saw 25 extraordinary code breaking amateurs from across the UK battle each other to ethically hack common Internet of Things (IoT) devices, including remote controlled cars, CCTV cameras and even children’s dolls.
On May 22nd 2017, the European Union Agency for Network and Information Security (ENISA) issued a position paper raising this very issue of IoT security. Together with major actors of the semiconductor industry (Infineon, NXP, STMicroelectonics), the agency warned of a “market failure” in IoT security so far: it’s important to act now.
The WannaCry ransomware attack this week shocked the world, and the ripples will be felt for months to come. It demonstrates that cyber criminals are stepping up their campaigns and one sector increasingly at risk is autonomous vehicles.
Digital identity and credentials provider Intercede has announced MyID as a Service (MyIDaaS). It is claimed to be a convenient and affordable cloud-based ‘strong credentials’ service for enterprises.
Do you remember how simple cars used to be? A dashboard with analogue dials and gauges that measured basic functions such as fuel, temperature and speed? If something was amiss with the engine, the oil light came on so you took your car to the garage (or even fixed it yourself if you were a good enough mechanic).
It is not just the election of Donald Trump that gives us pause for thought (and a variety of other emotions – see Facebook for most of them). There seem to be a host of other issues that have emerged recently which add to the need to stop and reflect.
SMiD Cloud, the makers of cloud privacy device SMiD Pro are bringing the market the first, plug & play solution that gives users total control over the privacy of their cloud-stored files, photos, videos, legal documents, blueprints, contracts and anything else they entrust to cloud providers.
Critical national infrastructure firms have been advised by security experts Symantec to check their networks after the discovery of a new attack, codenamed Dragonfly. Also known as Energetic Bear, Dragonfly is said to be capable of doing damage to utilities on the same scale as Stuxnet.
London, UK. October 25 (BUSINESS WIRE) — The growth of mainstream M2M solutions within critical information infrastructure such as utilities, healthcare, and finance is creating a headache for service providers and critical infrastructure operators
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.