IoT and ICS Security

IOT and ICS Security

Regulation for IIoT is on its way – but is it enough?

Regulation for IIoT is on its way – but is it enough?

/
Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition. Companies of all sizes, from major manufacturers ...
How to Talk to Old People

Germany bans sale, distribution and possession of kids’ smartwatches

/
The regulator is telling parents it's up to them to destroy the things ...
BlueBorne - Amazon Echo Take Over Demo

Amazon Echo and Google Home patched against BlueBorne threat

/
The attack doesn't require the targeted to be paired to the attacker’s device, or to be in discoverable mode ...

Women in Information Security: Beth Cornils

/
Last time, I had fun talking with Victoria Walberg. She really understands cloud and IoT cybersecurity. This time, I got to speak to Beth Cornils. She has a pretty cool job that ...
How to Talk to Old People

Hackers mimicking little kids can fool voice recognition systems

/
Misuse of the technology is going to rise right along with the popularity of voice apps, says a recent study ...

Apple FaceID Hacked

/
It only took a week: On Friday, Vietnamese security firm Bkav released a blog post and video showing that -- by all appearances -- they'd cracked FaceID with a composite mask of ...
Blockchain 101: How This Emerging Technology Works

Blockchain 101: How This Emerging Technology Works

/
Unless you’ve been living in Slab City or off the grid for a while, you’ve probably heard this year’s omnipresent buzzword ‘blockchain.’ But perhaps you’re a bit clueless as to what this ...
Medigate takes a surgical approach to protecting medical devices from cyberattacks

Medigate takes a surgical approach to protecting medical devices from cyberattacks

/
A Savage Security Market ReportGraphic courtesy MedigateOne of the primary challenges with IoT Security is how specific the threats are. While classes of devices have common vulnerabilities and attack surface, most are ...

Women in Information Security: Victoria Walberg

/
Last time, I spoke with Nitha Suresh. She’s written IEEE papers and knows her stuff when it comes to pentesting and aircraft data networks. This time, I had the pleasure of interviewing ...

Bkav, FaceTrick

/
Bkav Corporation's grab for the security spotlight, or something less? You be the judge. More, here... "Q: Can you explain why your hack worked but similar attempts (like Wired magazine's) failed?A: Because ...
Loading...