A new technique could provide an added layer of security in multirobot systems that encrypt communications, or an alternative in circumstances in which encryption is impractical.
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant, exposing the vulnerability of industrial controls.
New research from Michigan Technological University scientists addresses “nightmare” scenarios for energy systems, where hackers exploit security weaknesses and execute a disruptive plan of cyber attacks.
According to a study released by Ponemon Institute, 80 per cent of IoT apps are not tested for vulnerabilities, and there is a lack of urgency to address these vulnerabilities.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
Security firm SEC Consult has uncovered two backdoor accounts in Sony Ipela Engine IP Cameras, which could make them vulnerable to outside attacks.
Two UNSW professors have won global awards for their contribution to quantum computing, a field which is becoming increasingly important for industry.
According to CyberArk, access to privileged accounts information is one of the biggest threats to cyber security for today’s companies.
According to a new study by the University at Buffalo (UB), smartphones are an ideal tool to steal sensitive data from 3D printers.
Cyber crime accounted for 53 per cent of all crime in 2015, according to the National Crime Agency (NCA) Cyber Crime Assessment 2016. Cyber security experts forecast this figure is set to increase with the rise of smart cars and robots.
With the outsourcing of microchip design and fabrication worldwide, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. Researchers from NYU are finding a way to detect this.
It’s very hard to overstate how important the power grid is to any society and its economy. Every critical infrastructure, from communications to water, is built on it and every important business function from banking to milking cows is completely dependent on it.
A virus attack on the computer system of one of Melbourne’s largest hospital networks is cause for concern because it affected machines running Microsoft’s Windows XP, an operating system no longer supported by the software giant.
The Cisco 2016 Annual Security Report released today, which examines threat intelligence and cybersecurity trends, reveals that only 45 per cent of organisations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns.
CyberArk has launched a new industry initiative and report to mine cyber security insight and peer-to-peer guidance from a panel of Chief Information Security Officers (CISOs) from Global 1000 enterprises.
LogMeIn has unveiled Xively Identity Manager, which is designed to be a new approach to tackling the unique and complex challenges of identity and access management (IAM) of Internet of Things (IoT) users and products.
GE’s Control Solutions business line, a division of GE Measurement & Control, today announced its Bronze accreditation in Achilles Practices Certification (APC) by Wurldtech, an independent subsidiary of GE and market leader in industrial cyber security certification standards.
Cyber security needs to be taken seriously. And, as Matt McDonald writes, it is not just the high profile targeted attacks that industry needs to watch out for.
Perimeter protection is part of every industrial cyber security strategy.
The Internet of Things (IoT) stands to have a tremendous impact on business – and life – as we know it. And according to IT security company Damballa, the implications for cyber security will be huge.