U.S. federal agencies warned this week that a state-sponsored Chinese hacking group is positioned in critical infrastructure IT networks, including communications IT systems, and that they believe the hackers have had a presence in some IT networks for as long as five years.
The Cybersecurity...
Software AG remains set on its strategy to make mobile operators the go-to agents for private 5G in ‘vertical’ spectrum, and particularly in the Industry 4.0 space where it retains a developing crossover customer base in telecoms and industry. While most of the market...
The team of researches have tested smart city systems from Libelium, Echelon and Battelle
A team of researchers from Threatcare and IBM X-Force Red have joined forces to test several smart city devices, with the specific goal of finding vulnerabilities in smart city systems.
Earlier this...
Virtual networks: a bullseye for hackers
Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...
IBM Corp. debuted Monday the encryption capabilities of its new z14 mainframe, otherwise known as IBM Z, which is focused on combating the growing threat of data breaches.
The number of data breaches within the U.S. is on the rise. IBM purports universal encryption --...
Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...
It’s been a busy few days in the world of connected cars on many fronts. There’s been a live-hack, the crash of an autonomous car resulting in injuries and the discovery of a city that exists solely for the purpose of connected car testing.
Let’s...
DARPA researchers plan to demo vulnerability of connected car at conferences
WASHINGTON – Cybersecurity researchers Charlie Miller and Chris Valasek, funded by the federal government, announced they will publicly hack a connected car or truck.
The duo received a 2013 grant from the Defense Advance Projects...