What is an exploit?
๐ฉโ๐ Learn another security term this Wednesday: What is an exploit?
๐ฉโ๐ Learn another security term this Wednesday: What is an exploit?
This week: Learn about the three fundamentals of security: ๐confidentiality, ๐ก integrity and ๐ข availability
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers. Link to article of German newspaper “Die Zeit” (08.10.2022)
Since the onset of the COVID-19 pandemic, the world has seen a significant shift towards remote working. This shift has led to an increase in virtual meetings and, as a result, the use of Bluetooth headsets for convenience. But one question arises – are these Bluetooth headsets secure? To understand the security of a typical…
This excellent talk from RSA Conference 2023 tries to answer this question with what is currently known regarding: A clear recommendation to watch this presentation by Jason Kramer and Dr. Ulrich Lang, CEO to anyone in the OT/ICS industry.
AI can track the time you spend on your phone during work. The post below shows an interesting demonstration of the technical capabilities. From my point of view, these kind of AI applications will be and should be a focus of a broad public discussion in the near future. AI applications will offer great opportunities,…
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022. 6 hot cybersecurity trends โ and 2 going cold | CSO Online