Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and...
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind....
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no...
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it...
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing...
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and...
Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to...
Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security...
As our cities, our transportation, our energy and manufacturing – our everything – increasingly embrace Internet of Things (IoT) and Industrial Controls Systems (ICS),...
In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from...
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology...
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.)....
As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals,...
Social engineering doesn't have to be just a supporting process to obtain system access; it is could be even more dangerous when it is...
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G...