The Latest in IT Security

Posts Tagged ‘demo exploit’

A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He’s experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked. David Formby, a PhD student at Georgia Institute of Technology, conducted his experiment to warn the industry […]

Read more ...

A new dynamic random-access memory (DRAM) attack method disclosed by researchers on Friday can allow malicious actors to steal sensitive data from a virtual machine, through a covert channel, using JavaScript. Anders Fogh, principal malware analyst at G DATA Advanced Analytics, and Michael Schwarz, a Ph.D. student at the Graz University of Technology in Austria, […]

Read more ...

The best way to keep data safe is to keep it away from the Internet. This is what’s called an “air gap,” and it’s considered the most practical and effective means to keep hackers out. But the wide availability of drones makes jumping the air gap easier than ever, as Yokogawa Senior Prinicpal Tech Specialist […]

Read more ...


Categories

THURSDAY, MAY 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments