A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure...
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many,...
Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and...
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the...
China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a...
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of...
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through...
We have to ask ourselves; at what point does an unexpected outcome via expert prediction justify a prison sentence?
Minutes after I delivered cyber risk...
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing...
Social engineering doesn't have to be just a supporting process to obtain system access; it is could be even more dangerous when it is...
There is a new danger lurking in the information assets of countless organizations around the globe disguised by a plan devised to protect a...
Information security and IT security are often used interchangeably. Even among InfoSec professionals. The terms are interrelated and often share the common goals of...