Security

Displaying 311 - 320 of 368

Tesla model X hack: the danger of connected cars

Tesla model X hack: the danger of connected cars
Researchers have found security vulnerabilities in one of Tesla’s cars and demonstrated that they can be exploited remotely to do things like open the car’s doors and force it to break while in motion. Cesare Garlati, Chief Security Strategist at the prpl Foundation, commented on the news: "The danger with connected cars is the 'connected' aspect. Today’s IoT devices are housing numerous vulnerabilities, waiting for hackers to exploit them and connected cars are not immune, despite the possibility for a catastrophic outcome.
8th August 2017

How to train your hacker

How to train your hacker
Last month in Bristol the first weekend camp for teenage hackers took place. The National Crime Agency (NCA) set up the course to 'redirect' hackers from a life of crime. The pupils were encouraged to use their talents for good through cyber skills workshops and advice about careers in computer security. According to Ethan Thomas, an operations officer in the NCA's Prevent team, which engages with young cyber-offenders, the attendees chosen were known to police because they had been caught carrying out one or more computer crimes.
2nd August 2017

Undercover research reveals tactics of phishing hackers

Undercover research reveals tactics of phishing hackers
Provider of cyber security solutions that protect business-critical data and applications, Imperva, has released its research report, Beyond Takeover – Stories from a Hacked Account. The report reveals common patterns in phishing attacks and how hackers find and use data in compromised accounts. To discover details about compromised credentials, Imperva researchers went undercover by creating several fake user accounts, including email and file sharing accounts with Google and Dropbox.
2nd August 2017


No security compromising when virtualising control applications

No security compromising when virtualising control applications
Virtualisation can bring a wide variety of benefits to industrial control applications without compromising on the level of security delivered by traditional physical infrastructure, as long as you have selected the right software platform. Guest blog by Charlie Ashton.
28th July 2017

Devil's Ivy vulnerability poisoning millions of IoT devices

Devil's Ivy vulnerability poisoning millions of IoT devices
Recent news reports have revealed that millions of products ranging from airport surveillance cameras, sensors, networking equipment and IoT devices are vulnerable to a flaw that allows attackers to remotely gain control over devices or crash them. The vulnerability, named Devil’s Ivy, was identified by researchers who singled out high-end security cameras manufactured by Axis Communications. The researchers at Senrio said that 249 models of 251 Axis cameras are vulnerable to Devil's Ivy.
27th July 2017

Don’t let your fridge door be a way into your network

Don’t let your fridge door be a way into your network
Police have warned that household appliances which connect to the internet will increasingly be hacked by criminals seeking to steal your identity, rob your home or bank accounts. Chief Constable, Mike Barton, who leads the National Police Chiefs Council on crime operations, has warned about the dangers of the Internet of Things (IoT) as more ordinary household items become connected.  
25th July 2017

FBI issues warning about Internet-connected toys

FBI issues warning about Internet-connected toys
A public service announcement about the improper security and privacy protections provided by manufacturers of Internet-connected smart toys, also known as IoT toys, has been issued by the Internet Crime Complaint Centre (IC3), a division of the FBI. The announcement comes after numerous issues were reported where smart toys had leaked the personal details of small children and vulnerabilities allowed hackers to spy on children.
25th July 2017

How to thwart POS hackers

How to thwart POS hackers
In the present climate it is unusual that a day goes by without a cyber security story hitting the headlines. Data hacking, digital terrorism and cyber security breaches have become commonplace in our ever-more connected world. 
24th July 2017

Doubling down on security

Doubling down on security
The general availability milestone for the latest release of the Wind River Titanium Cloud product family has been achieved. Guest blog by Ron Breault.
19th July 2017

App protects your digital legacy after you pass away

App protects your digital legacy after you pass away
The password manager and secure digital vault, Keeper Security, has announced its new Emergency Access feature which will allow up to five trusted family members or friends entrance into a customer’s secure digital vault to access important files, passwords and documents in the case of an emergency or tragic event. Emergency Access can be set up to protect Keeper customers’ digital legacies in the event they become incapacitated, disabled or pass away.
18th July 2017


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

European Microwave Week 2019
29th September 2019
France Porte De Versailles Paris
IoT Solutions World Congress 2019
29th October 2019
Spain Barcelona