IssSource Author Archive

Tesla Cloud Account Hacked

Hackers were able to get into one of Tesla’s Amazon cloud accounts and use it to run currency-mining software, a
Read More.

More OT, IoT Attacks Coming: Report

Attacks targeting operational technology (OT) such as ICS and IoT devices are still uncommon enough that security professionals
Read More.

Weak ICS Security Leaves Plants at Risk

Everyone in the manufacturing automation sector knows the industrial control systems (ICS) are the heart of all manufacturing
Read More.

Mitsubishi Integrates CC-Link IE Safety Features

Mitsubishi Electric Automation, Inc. integrated CC-Link IE Field Safety features into its MR-J4-GF Servo Amplifiers, facilitating industrial Ethernet safety communication
Read More.

Charging Mobile Devices Wirelessly

It is always the case, you are using your tablet or smartphone and the battery runs down and you spend
Read More.

Hacker Proof Power Plant Software

There is a hacker-resistant software currently going through field trials in a power plant that is showing promise. The field
Read More.

Economy Loses $100B to Cyber Incidents

Just the U.S. economy alone loses between $57 billion and $109 billion per year to malicious cyber activity,
Read More.

Fixing Human Attack Surface

By Jeff Lund
Like many specialized disciplines, the world of cybersecurity is filled with technical jargon that can hamper
Read More.

SEC Wants Public Disclosure of Incidents

Companies have remained mum on all things related to cybersecurity for quite a long time, but that may soon change
Read More.

Trend Micro Fixes Email Encryption Gateway

Trend Micro fixed a series of vulnerabilities in its Email Encryption Gateway. The Trend Micro Encryption for Email Gateway (TMEEG)
Read More.

 
 
Archived Entries