Avionics Magazine – In December 2017, IOACTIVE cybersecurity researcher Ruben Santamarta demonstrated his ability to establish a shell presence on a real in-flight airborne commercial airplane internet modem. The general public, though, would not learn about the demonstration until mid-2018, when Santamarta released a preview of a 70-page report detailing how the flaws exposed in that modem also allowed him to spy on cargo ships and hidden military bases.
Article Categories: ARTICLE
7 Steps You Can Take to Avoid Getting Hacked
Complex – No matter how many measures you take to protect your personal information, the unfortunate truth is that no computer is truly safe. Any device that connects to the internet is theoretically vulnerable to being hacked, which means everything from your bank account to your credit cards to your social media accounts could be compromised, if your personal data were to fall into the wrong hands.
WHAT’S ON: BOMA’s big holiday bash, Make-A-Wish members Christmas push
Real Estate Weekly – Dec. 4: The commercial real estate development association will host Building a Better NJ: Future Proof Your Buildings at the EY Learning Center, 121 River Street, Hoboken, N.J. from 2:30 – 6 p.m. The series will examine the importance of keeping pace with technology to ensure that commercial real estate properties remain viable, desirable and compliant in the future.
This Chinese Billionaire Wants to Put Human-Like Robots in Your Home
Bloomberg – Chinese robotics billionaire James Zhou scored a win this year when Tencent Holdings Ltd. helped fund his startup at a $5 billion valuation. But Zhou’s already chasing more cash. The goal? To make his singing, dancing, yoga-teaching robots more lifelike.
Global Connected Car Security Solutions Market 2018 Insights and Trends: Harman, Arxan, Argus, Guardtime, Infineon
Digital Journal – The Connected Car Security Solutions Market is defined by the presence of some of the leading competitors operating in the market, including the well-established players and new entrants, and the suppliers, vendors, and distributors. Connected car security solutions is a radio communication service used permanently or temporarily for the safeguarding of connected cars. A connected car is a car that is equipped with Internet access, and usually also with a wireless local area network.
Raft of flaws discovered in MiSafes child-monitoring devices
The Daily Swig – Once again, a child-monitoring gadget has been found to be vulnerable to hackers, leaving 14,000 children open to location tracking, phone calls from strangers, and more.
How Your Security System Could Be Hacked
24/7 Home Security – When it comes to burglary, we often imagine individuals who use brute force to break into your doors and windows, take all your valuables, and then attempt to run away before police arrive. Our existing security systems are designed for for those kind of criminals. But with the rise of smart security systems, what if criminals have learned to bypass your system and disable your alarms?
Securing Industries, One Hack At A Time
Forbes – Information security companies sometimes get blow back from legitimate research that might at first be seen as an unnecessary embarrassment to an entire industry, then in retrospect understood as a necessary—if painful– first step. “If you look at the automotive industry,” said Jennifer Sunshine Steffens, CEO of IOActive, a security company which is celebrating its 20th year this year, “we had been doing work in automotive security research for years. But it took one video going viral — and the talks that came from it — to wake folks up and actually be empowered to do something about it”
Staying Safe in the Automated Workplace
AuthO – While humans traditionally have staffed assembly lines, prepped and served food, and entered data into spreadsheets — more and more, machines are taking over these tasks.
7 Non-Computer Hacks That Should Never Happen
Dark Reading – You might look at an old fax machine or dusty printer and just see out-of-date technology that you can’t even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you’ll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think.