Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Search
Marin Ivezic Marin Ivezic Marin Ivezic
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Home Research - Tests Show Vulnerabilities of Superyachts

    Research – Tests Show Vulnerabilities of Superyachts

    By
    Marin Ivezic
    -
    November 19, 2017
    Superyachts Cyber-Kinetic

    Researcher Campbell Murray demonstrated the ease with which superyacht navigation, communication and Wi-Fi systems could be controlled remotely by hackers.

    Superyachts Cyber-Kinetic
    Previous articleResearch – Tests Show Vulnerabilities of Industrial Robots
    Next articleResearch – Test Demonstrates Vulnerabilities of a Commercial Aircraft
    Marin Ivezic
    Marin Ivezic
    ABOUT US
    Marin Ivezic's personal blog with guest contributors on security, safety, privacy and controllability of emerging technologies such as AI, IoT, Blockchain, Metaverse, and others.
    FOLLOW US
    Linkedin Mail RSS Skype Telegram Twitter WhatsApp
    • Home
    • About
    • My Books
      • Securing Society 5.0
      • The Future of Leadership in the Age of AI
      • Crypto & Blockchain Security
      • Cyber-Kinetic Security
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • Contact
    © Marin Ivezic | Terms of Use | Privacy Policy