From 5% to 94% Grid Visibility: How Ecuador Modernized Its Energy Distribution Network with ADMS

Credit to Author: Jose Angel Rios Blanco| Date: Fri, 22 Feb 2019 13:27:18 +0000

Energy distribution modernization requires a coordinated, strategic, research and development effort, and an implementation that involves collaboration between public and private sectors. Economic growth and prosperity, national security and the… Read more »

The post From 5% to 94% Grid Visibility: How Ecuador Modernized Its Energy Distribution Network with ADMS appeared first on Schneider Electric Blog.

Read more

If Your iPhone is Stolen, These Guys May Try to iPhish You

Credit to Author: BrianKrebs| Date: Tue, 14 Mar 2017 05:17:33 +0000

KrebsOnSecurity recently featured the story of a Brazilian man who was peppered with phishing attacks trying to steal his Apple iCloud username and password after his wife’s phone was stolen in a brazen daylight mugging. Today, we’ll take an insider’s look at an Apple iCloud phishing gang that appears to work quite closely with organized crime rings — within the United States and beyond — to remotely unlock and erase stolen Apple devices. Victims of iPhone theft can use the Find My iPhone feature to remotely locate, lock or erase their iPhone — just by visiting Apple’s site and entering their iCloud username and password. Likewise, an iPhone thief can use those iCloud credentials to remotely unlock the victim’s stolen iPhone, wipe the device, and resell it. As a result, iPhone thieves often subcontract the theft of those credentials to third-party iCloud phishing services. This story is about one of those services.

Read more