Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Search
Marin Ivezic Marin Ivezic Marin Ivezic
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Home Research - Tests Show Vulnerabilities of ICS Systems to Ransomware

    Research – Tests Show Vulnerabilities of ICS Systems to Ransomware

    By
    Marin Ivezic
    -
    November 19, 2017
    ICS Cyber-Kinetic

    Georgia Institute of Technology researchers David Formby and Raheem Beyah demonstrated a ransomware targeting industrial control devices.

    ICS Cyber-Kinetic
    Previous articleResearch – Test Defeats Geofencing Safeguards on Drones
    Next articleResearch – Tests Show Vulnerabilities of Industrial Robots
    Marin Ivezic
    Marin Ivezic
    ABOUT US
    Marin Ivezic's personal blog with guest contributors on security, safety, privacy and controllability of emerging technologies such as AI, IoT, Blockchain, Metaverse, and others.
    FOLLOW US
    Linkedin Mail RSS Skype Telegram Twitter WhatsApp
    • Home
    • About
    • My Books
      • Securing Society 5.0
      • The Future of Leadership in the Age of AI
      • Crypto & Blockchain Security
      • Cyber-Kinetic Security
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • Contact
    © Marin Ivezic | Terms of Use | Privacy Policy