The Latest in IT Security

Posts Tagged ‘Demo’

Researchers have discovered a new attack method that could allow malicious actors to disrupt and manipulate the physical processes managed by programmable logic controllers (PLCs) without being detected. The attack method was detailed on Thursday at the Black Hat Europe 2016 security conference by Ali Abbasi, a Ph.D. candidate in the distributed and embedded system […]

Read more ...

Security researchers used the recent Def Con hackers’ convention to show just how easily some Bluetooth-based smart locks can be opened. Researchers Ben Ramsey and Anthony Rose of Merculite Security took a look at 16 smart locks from companies such as Ceomate, Elecycle, iBlulock, Mesh Motion, Okidokey, Plantraco, Quicklock, and Vians. Ramsey and Rose discovered that […]

Read more ...

Free airline Fast Track for all! Free lunch and booze at luxury airport lounges for all! Duty-free shopping for all! That’s what a fake QR code generating app can get you, according to Przemek Jaroszewski, head of Poland’s Computer Emergency Response Team (CERT). At the Defcon security conference in Las Vegas on Sunday, Jaroszewski presented […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks