Trending

Heat Index

Posts Tagged ‘hacking’

Most Recent
 
Read More
September 11, 2017

Ethical amateur hackers take over CCTV cameras and internet connected toys in cyber contest

On Friday evening, NCC Group and Cyber Security Challenge UK ran a competition which saw 25 extraordinary code breaking amateurs from across the UK battle each other to ethically hack common Internet of Things (IoT) devices, including remote controlled cars, CCTV cameras and even children’s dolls.

220
 
Read More
July 12, 2017

Transatel pleads for new pillars of IoT security

On May 22nd 2017, the European Union Agency for Network and Information Security (ENISA) issued a position paper raising this very issue of IoT security. Together with major actors of the semiconductor industry (Infineon, NXP, STMicroelectonics), the agency warned of a “market failure” in IoT security so far: it’s important to act now.

220
 
Read More
June 14, 2017

Connected complexity could see rise in recalls

The WannaCry ransomware attack this week shocked the world, and the ripples will be felt for months to come. It demonstrates that cyber criminals are stepping up their campaigns and one sector increasingly at risk is autonomous vehicles.

150
 
Read More
June 6, 2017

Intercede launches MyIDaaS a convenient and affordable cloud-based service for enterprises

Digital identity and credentials provider Intercede has announced MyID as a Service (MyIDaaS). It is claimed to be a convenient and affordable cloud-based ‘strong credentials’ service for enterprises.

100
 
Read More
May 24, 2017

The Internet of Things? You’ll find it in your car

Do you remember how simple cars used to be? A dashboard with analogue dials and gauges that measured basic functions such as fuel, temperature and speed? If something was amiss with the engine, the oil light came on so you took your car to the garage (or even fixed it yourself if you were a good enough mechanic).

300
 
Read More
December 12, 2016

Do we need a pause from all this headlong progress?

It is not just the election of Donald Trump that gives us pause for thought (and a variety of other emotions – see Facebook for most of them). There seem to be a host of other issues that have emerged recently which add to the need to stop and reflect.

90
 
Read More
February 3, 2016

SMiD Cloud launches SMiD Pro cloud privacy solution

SMiD Cloud, the makers of cloud privacy device SMiD Pro are bringing the market the first, plug & play solution that gives users total control over the privacy of their cloud-stored files, photos, videos, legal documents, blueprints, contracts and anything else they entrust to cloud providers.

135
 
Read More
July 4, 2014

Western energy companies under ‘state-backed’ sabotage threat from Dragonfly, security firms warn

Critical national infrastructure firms have been advised by security experts Symantec to check their networks after the discovery of a new attack, codenamed Dragonfly. Also known as Energetic Bear, Dragonfly is said to be capable of doing damage to utilities on the same scale as Stuxnet.

125
 
Read More
October 27, 2012

M2M network security market to generate $752m by 2017 as critical infrastructure concerns grow, says ABI

London, UK. October 25 (BUSINESS WIRE) — The growth of mainstream M2M solutions within critical information infrastructure such as utilities, healthcare, and finance is creating a headache for service providers and critical infrastructure operators

125

IoT LIFE LESSONS.

 
Read More
665

FEATURED VIDEOS

 
What are the greatest customer benefits of eSIMs? Quickfire Interview with Arm
 
 
 
 

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close