Ethical amateur hackers take over CCTV cameras and internet connected toys in cyber contest

On Friday evening, NCC Group and Cyber Security Challenge UK ran a competition which saw 25 extraordinary code breaking amateurs from across the UK battle each other to ethically hack common Internet of Things (IoT) devices, including remote controlled cars, CCTV cameras and even children’s dolls.

Read more

Transatel pleads for new pillars of IoT security

On May 22nd 2017, the European Union Agency for Network and Information Security (ENISA) issued a position paper raising this very issue of IoT security. Together with major actors of the semiconductor industry (Infineon, NXP, STMicroelectonics), the agency warned of a “market failure” in IoT security so far: it’s important to act now.

Read more

Connected complexity could see rise in recalls

The WannaCry ransomware attack this week shocked the world, and the ripples will be felt for months to come. It demonstrates that cyber criminals are stepping up their campaigns and one sector increasingly at risk is autonomous vehicles.

Read more

Intercede launches MyIDaaS a convenient and affordable cloud-based service for enterprises

Digital identity and credentials provider Intercede has announced MyID as a Service (MyIDaaS). It is claimed to be a convenient and affordable cloud-based ‘strong credentials’ service for enterprises.

Read more

The Internet of Things? You’ll find it in your car

Do you remember how simple cars used to be? A dashboard with analogue dials and gauges that measured basic functions such as fuel, temperature and speed? If something was amiss with the engine, the oil light came on so you took your car to the garage (or even fixed it yourself if you were a

Read more

Do we need a pause from all this headlong progress?

It is not just the election of Donald Trump that gives us pause for thought (and a variety of other emotions – see Facebook for most of them). There seem to be a host of other issues that have emerged recently which add to the need to stop and reflect.

Read more

SMiD Cloud launches SMiD Pro cloud privacy solution

SMiD Cloud, the makers of cloud privacy device SMiD Pro are bringing the market the first, plug & play solution that gives users total control over the privacy of their cloud-stored files, photos, videos, legal documents, blueprints, contracts and anything else they entrust to cloud providers.

Read more

Western energy companies under ‘state-backed’ sabotage threat from Dragonfly, security firms warn

Critical national infrastructure firms have been advised by security experts Symantec to check their networks after the discovery of a new attack, codenamed Dragonfly. Also known as Energetic Bear, Dragonfly is said to be capable of doing damage to utilities on the same scale as Stuxnet.

Read more

M2M network security market to generate $752m by 2017 as critical infrastructure concerns grow, says ABI

London, UK. October 25 (BUSINESS WIRE) — The growth of mainstream M2M solutions within critical information infrastructure such as utilities, healthcare, and finance is creating a headache for service providers and critical infrastructure operators

Read more