Cyber Security
Devil's Ivy vulnerability poisoning millions of IoT devices
Recent news reports have revealed that millions of products ranging from airport surveillance cameras, sensors, networking equipment and IoT devices are vulnerable to a flaw that allows attackers to remotely gain control over devices or crash them. The vulnerability, named Devil’s Ivy, was identified by researchers who singled out high-end security cameras manufactured by Axis Communications. The researchers at Senrio said that 249 models o...
Allianz and InsurTech Startup Flock to launch pay-as-you-fly drone insurance
Allianz Global Corporate & Specialty SE (AGCS) has worked with InsurTech startup Flock to develop digital insurance solutions for the growing drones or ‘Unmanned Aircraft Systems’ (UAS) market. The partnership’s first product, to be launched later this year in the UK market, is a mobile app (for Android and iOS devices) enabling operators to purchase ‘pay-as-you-fly’ drone insurance at the touch of a bu...
Don’t let your fridge door be a way into your network
Police have warned that household appliances which connect to the internet will increasingly be hacked by criminals seeking to steal your identity, rob your home or bank accounts. Chief Constable, Mike Barton, who leads the National Police Chiefs Council on crime operations, has warned about the dangers of the Internet of Things (IoT) as more ordinary household items become connected.
FBI issues warning about Internet-connected toys
A public service announcement about the improper security and privacy protections provided by manufacturers of Internet-connected smart toys, also known as IoT toys, has been issued by the Internet Crime Complaint Centre (IC3), a division of the FBI. The announcement comes after numerous issues were reported where smart toys had leaked the personal details of small children and vulnerabilities allowed hackers to spy on children.
How to thwart POS hackers
In the present climate it is unusual that a day goes by without a cyber security story hitting the headlines. Data hacking, digital terrorism and cyber security breaches have become commonplace in our ever-more connected world.
App protects your digital legacy after you pass away
The password manager and secure digital vault, Keeper Security, has announced its new Emergency Access feature which will allow up to five trusted family members or friends entrance into a customer’s secure digital vault to access important files, passwords and documents in the case of an emergency or tragic event. Emergency Access can be set up to protect Keeper customers’ digital legacies in the event they become incapacitated,...
Network appliance for network security and virtualisation
The Lanner NCA-6210, a 2U x86 rackmount network appliance built with the Intel Xeon Scalable processor platform and C621/C627 chipset, features powerful networking processing capability, higher throughput for virtualisation applications, up to 640GB DDR4 2666MHz REG DIMM and the support for 1.5x memory bandwidth as previous generation Intel Xeon processor based server platforms.
How do you get a robot to recognise a surprise?
How do you get a robot to recognise a surprise? That's a question Artificial Intelligence (AI) researchers are pondering, especially as AI begins to change space research. A new article in the journal Science: Robotics offers an overview of how AI has been used to make discoveries on space missions.
Miniaturising computer chips of drones
In recent years, engineers have worked to shrink drone technology, building flying prototypes that are the size of a bumblebee and loaded with even tinier sensors and cameras. Thus far, they have managed to miniaturise almost every part of a drone, except for the brains of the entire operation — the computer chip.
Duo provide safe, trusted, and easy-to-use IoT devices
STMicroelectronics and Security Platform, a Korea-based technology innovator enabling trusted connectivity for the Internet of Things (IoT), are bringing robust, efficient, and easy-to-use security solutions to IoT devices. The IoT comprises potentially billions of tiny, connected, embedded computing devices to help manage services and infrastructure automatically.