Cyber Security
On the safe side with SecurityBridge
If people, machinery and industrial processes are intelligently linked, these networks are also more susceptible to attack. The Pilz SecurityBridge protects the configurable, safe small controllers PNOZmulti and the automation system PSS 4000 from network-based attacks and unauthorised access.
Encryption techniques protect cloud-based machine learning
A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image analysis and other applications that use sensitive data. Outsourcing machine learning is a rising trend in industry.
Smart door lock enables users to monitor doors via smartphone
Ultra low power (ULP) RF specialist Nordic Semiconductor has announced that Samsung SDS, a Seoul-based subsidiary of multinational corporation Samsung, has used Nordic's award-winning nRF52832 Bluetooth Low Energy (Bluetooth LE) System-on-Chip (SoC) in its 'SHP-DP930 Smart Doorlock'.
Five ways cybercriminals can abuse MQTT servers to hack smart homes
New research from Avast has found more than 49,000 Message Queueing Telemetry Transport (MQTT) servers publicly visible on the internet due to a misconfigured MQTT protocol. This includes more than 32,000 servers with no password protection, putting them at risk of leaking data.
Open source software stack for easier security integration
Infineon Technologies has enabled a new open source software stack. It makes work easier for developers who want to use the Trusted Platform Module (TPM) 2.0 – a standardised hardware-based security solution for securing industrial, automotive and other applications such as network equipment. This is the first open source TPM middleware that complies with the TSS ESAPI specification of the TCG, providing significant value to the open s...
The Quantum Revolution joint white paper released
As innovators continue to make progress with quantum computers, organisations that process sensitive data for ten or more years, such as governments, financial services and healthcare, need to start planning for a post-quantum computing world.
Dedicated services for drone industry entrepreneurs
The first ever dedicated incubator and start-up services for entrepreneurs, professionals and enthusiasts within the drone industry have been launched by SUAS Global the world’s largest online drone network.
Company achieves full ISO 27001 certification
It has been announced that Cognidox, a leading provider of document management solutions for the high tech industry, has achieved ISO 27001 information security management certification. ISO 27001 certification is one of the most widely recognised and internationally accepted information security standards.
Spam is still the number one choice for online criminals
Online criminals have gotten savvier but they’re still relying on the same old tricks they’ve been using for decades. F-Secure research shows spam remains the most common method of spreading malicious URLs, scams and malware more than 40 years after the first email spam was sent.
Five cyber security tips to protect your business and website
The Gartner information technology (IT) consultancy firm forecasts that businesses will increase cyber security spending to more than $96bn to protect their proprietary data. The funding is critical as known threats, such as ransomware, give way to new and exotic intrusion programming. This kind of exploit faded rapidly from 70% of all malware payloads to only 5%, only to be replaced by newer exploitation methods.