• Recently, a security researcher disclosed that Seagate’s Network Attached Storage (NAS) unpatched vulnerabilities leaves thousands at risk. Find out what you can do to secure your NAS devices in order to avoid likely attacks.
  • Researchers recently tested ten new connected home security systems and found that all of them had security flaws. Learn how these system vulnerabilities can negatively impact the safety of your home.
  • In a thorough investigation of gas pumps that use the Guardian aboveground storage tanks (AST) monitoring system in the United States, threat researchers Kyle Wilhoit and Stephen Hilt found one particular unit that has been tampered with.
  • This live casino online paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
  • Another existing widespread vulnerability known as Shellshock has been found, threatening to compromise millions of systems, servers and devices. What is it, who is affected, and what can you do?
  • The last post in the series discusses High-Risk/Low-Feasibility attacks, which is the most damaging of the three attack scenarios.
  • In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
  • Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
  • Smart grids are power grids with digital capabilities. Given the widespread control smart grids hold over public utilities, attackers are likely to target them to gain power or extort money.