cybersecurity

As you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players….

Read More

Researchers at a Belgian University earlier this week revealed the discovery of a break in the security protocol used to protect the vast majority of Wi-Fi connections (WPA2 based).  Mathy Vanhoef of imec-DistriNet, KU Leuven University, released his findings explaining that an attacker within range of a victim can exploit these weaknesses using…

Read More

It feels like barely a week goes by without another breaking news account of a terrorist attack involving vehicle ramming, a form of attack in which a perpetrator deliberately aims a motor vehicle at a target with the intent to inflict fatal injuries or significant property damage by striking with…

Read More

Few people would argue that cybersecurity is in a parlous state. In the last few weeks, we’ve seen a connected car wash and fish tank hacked respectively and a smart gun unlocked and fired thanks to a magnet at the latest DefCon. In response to the problem, a bipartisan group…

Read More

Ten years ago you didn’t have to worry about someone hacking your refrigerator. Today, your personal home assistant is quite literally listening to your every move. Experts believe that in just a few years, there will be over 20 billion devices connected to the internet with the possibility of being…

Read More

There’s no question that the Internet of Things is the new security battleground. Internet-connected webcams, HVAC systems, cars, TVs, watches, printers and more are giving people more use out of their devices. But these devices also open doors to hackers who want to steal corporate data, lasso thousands of devices into botnets…

Read More

Last month, public reports from ESET and Dragos outlined a new, highly capable Industrial Controls Systems (ICS) attack platform — the one reportedly used in 2016 against critical utilities infrastructure in Ukraine. CRASHOVERRIDE (alternately named Industroyer), the malware framework used on a cyberattack on the Ukraine electric grid in 2016, hit an…

Read More