Cyber Security
UK universities recognised for excellence in cyber security research
Three UK universities have been recognised as Academic Centres of Excellence in Cyber Security Research (ACE-CSR), highlighting the country is leading the way in cyber security skills. The universities will now join 14 other institutions in a scheme forming part of the Government’s National Cyber Security Strategy.
On the safe side with SecurityBridge
If people, machinery and industrial processes are intelligently linked, these networks are also more susceptible to attack. The Pilz SecurityBridge protects the configurable, safe small controllers PNOZmulti and the automation system PSS 4000 from network-based attacks and unauthorised access.
Encryption techniques protect cloud-based machine learning
A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image analysis and other applications that use sensitive data. Outsourcing machine learning is a rising trend in industry.
Smart door lock enables users to monitor doors via smartphone
Ultra low power (ULP) RF specialist Nordic Semiconductor has announced that Samsung SDS, a Seoul-based subsidiary of multinational corporation Samsung, has used Nordic's award-winning nRF52832 Bluetooth Low Energy (Bluetooth LE) System-on-Chip (SoC) in its 'SHP-DP930 Smart Doorlock'.
Five ways cybercriminals can abuse MQTT servers to hack smart homes
New research from Avast has found more than 49,000 Message Queueing Telemetry Transport (MQTT) servers publicly visible on the internet due to a misconfigured MQTT protocol. This includes more than 32,000 servers with no password protection, putting them at risk of leaking data.
Open source software stack for easier security integration
Infineon Technologies has enabled a new open source software stack. It makes work easier for developers who want to use the Trusted Platform Module (TPM) 2.0 – a standardised hardware-based security solution for securing industrial, automotive and other applications such as network equipment. This is the first open source TPM middleware that complies with the TSS ESAPI specification of the TCG, providing significant value to the open s...
The Quantum Revolution joint white paper released
As innovators continue to make progress with quantum computers, organisations that process sensitive data for ten or more years, such as governments, financial services and healthcare, need to start planning for a post-quantum computing world.
Dedicated services for drone industry entrepreneurs
The first ever dedicated incubator and start-up services for entrepreneurs, professionals and enthusiasts within the drone industry have been launched by SUAS Global the world’s largest online drone network.
Company achieves full ISO 27001 certification
It has been announced that Cognidox, a leading provider of document management solutions for the high tech industry, has achieved ISO 27001 information security management certification. ISO 27001 certification is one of the most widely recognised and internationally accepted information security standards.
Spam is still the number one choice for online criminals
Online criminals have gotten savvier but they’re still relying on the same old tricks they’ve been using for decades. F-Secure research shows spam remains the most common method of spreading malicious URLs, scams and malware more than 40 years after the first email spam was sent.