Week in Review: IoT, Security, Auto


Internet of Things Internet of Things vendors and providers of network services need to collaborate to fully realize the possibilities presented by the IoT, Chris Martin of PowWowNow writes. “The potential applications for IoT sensors and devices span a vast number of industries, with IoT technologies expediting the growth of smart cities, autonomous vehicles and connected industry technolog... » read more

Week in Review: IoT, Security, Auto


Internet of Things What’s better than a 5G network? How about a local, private 5G network? The Industrial Internet of Things may drive the development of such networks. Of course, 5G cellular communications technology is still being worked out worldwide. BMW, Daimler, and Volkswagen are looking ahead to the future; those automotive manufacturers notified Germany’s Federal Network Agency th... » read more

Hack the Vote: The Simulation of Vote Hacking at DEF CON


DEF CON, started in 1992 by the Dark Tangent, is the world’s largest running and underground hacking conference held annually at Caesar’s Palace in Las Vegas. It is a convention attended by various people from hackers, to journalists, to lawyers, to cybersecurity professionals, to federal government employees. At the second annual DEF CON Voting Village, a part of the convention that seeks ... » read more

Week in Review: IoT, Security, Auto


Deals Dialog Semiconductor made a blockbuster deal with Apple – the chip company will license power management technologies and transfer some assets to Apple, which will use them in their internal chip research and development. More than 300 Dialog employees, mostly engineers, will join Apple, which will pay $300 million in cash for the transaction and prepay another $300 million for Dialog ... » read more

Week in Review: IoT, Security, Auto


Internet of Things Release 3 is published by oneM2M, the worldwide Internet of Things interoperability standards initiative. The third set of specifications deals with 3GPP interworking, especially as it relates to cellular IoT connectivity, among other features. The release is said to enable seamless interworking with narrowband IoT and LTE-M connectivity through the 3GPP Service Capability E... » read more

The Week in Review: IoT


Cybersecurity Cybersecurity concerns continued to generate news this week. Symantec reported a corporate espionage hacking campaign against manufacturers of medical supplies, dubbing the efforts “Orangeworm.” The hackers have attacked 24 or more targets this year, and almost 100 since 2015, according to the security software and services firm. Meanwhile, the House Energy and Commerce Co... » read more

Is The IoT Getting Safer?


The Internet of Things as we know has been in use in some form or another for at least a decade, but it is only in the past several years that it has achieved enough success that security has become an overriding issue. The fact that breaches are no longer shocking is a sign that attacks are becoming more common. Only the biggest and baddest hacks raise eyebrows, like today's hack of Germany... » read more

AI Today, AI Tomorrow


Artificial intelligence (AI) is the most talked-about technology of our time. But AI’s present and future means many things to many people. We commissioned this survey, with the help of Northstar Research Partners, to gain insight into what consumers think about AI’s usefulness today and its promise for tomorrow. What we discovered was astonishing. To read more, click here. » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Security Becomes A Multi-System Issue


The fallout from the Mirai malware attack last week was surprising, given that it was published on the Internet several months ago as open-source. Despite numerous warnings, it still managed to cause denial of service attacks at Amazon, Netflix, and a slew of other companies that are supposed to be able to fend off these kinds of attacks. The good news is that it more people talking about th... » read more

← Older posts Newer posts →