How Your Security System Could Be Hacked
24/7 Home Security – When it comes to burglary, we often imagine individuals who use brute force to break into your doors and windows, take all your valuables, and then attempt to run away before police arrive. Our existing security systems are designed for for those kind of criminals. But with the rise of smart security systems, what if criminals have learned to bypass your system and disable your alarms?
Securing Industries, One Hack At A Time
Forbes – Information security companies sometimes get blow back from legitimate research that might at first be seen as an unnecessary embarrassment to an entire industry, then in retrospect understood as a necessary—if painful– first step. “If you look at the automotive industry,” said Jennifer Sunshine Steffens, CEO of IOActive, a security company which is celebrating its 20th year this year, “we had been doing work in automotive security research for years. But it took one video going viral — and the talks that came from it — to wake…
Staying Safe in the Automated Workplace
AuthO – While humans traditionally have staffed assembly lines, prepped and served food, and entered data into spreadsheets — more and more, machines are taking over these tasks.
7 Non-Computer Hacks That Should Never Happen
Dark Reading – You might look at an old fax machine or dusty printer and just see out-of-date technology that you can’t even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you’ll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think.
IOActive Highlights Security Issues and Concerns for Smart Cities
Techspective – There are a variety of potential benefits for cities that embrace technology. “Smart cities” can implement technology to streamline functionality and improve efficiency in a number of ways from detecting when a public parking lot is full to enabling remote wireless control of traffic signals. Of course, connecting the infrastructure of a city and making it remotely accessible and manageable also exposes it to potential risk and malicious activity.