Ctrl+Alt+Truth. Welcome to the future of cybercrime

Credit to Author: Rik Ferguson| Date: Thu, 04 Nov 2021 00:00:00 +0000

Welcome to 2030, to the nation of New San Joban, where a single keystroke can alter reality. Discover what a fully converged digital world means for the future of cybersecurity, and how you can stay ahead of the bad guys.

Read more

This Week in Security News – December 3, 2021

Credit to Author: Jon Clay| Date: Fri, 03 Dec 2021 00:00:00 +0000

This week, learn about how Squirrelwaffle utilized ProxyLogon and ProxyShell to hack email chains. Also, read on a recent data breach of the Los Angeles Planned Parenthood Network.

Read more

Private 5G Security Risks in Manufacturing Part 3

Credit to Author: Yohei Ishihara| Date: Fri, 29 Oct 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Private 5G Security Risks in Manufacturing Part 2

Credit to Author: Yohei Ishihara| Date: Fri, 15 Oct 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Private 5G Security Risks in Manufacturing Part 4

Credit to Author: Yohei Ishihara| Date: Fri, 12 Nov 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Security Risks with Private 5G Networks in Manufacturing Part. 3

Credit to Author: Yohei Ishihara| Date: Fri, 29 Oct 2021 00:00:00 GMT

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the “democratization of communications” entails its own risks that have not yet been made clear. To identify these risks, Trend Micro performed tests using an environment modeled after a steelworks with 5G equipment. In this third installment, we will describe the four penetration routes and three signal interception points identified in these tests, and we will discuss attack scenarios that exploit these weaknesses.

Read more

Smart Car Makers VW & Nissan to Build Smart Factories

Credit to Author: Ericka Pingol| Date: Wed, 27 Oct 2021 00:00:00 GMT

The car-making giants have taken big leaps to ensure they address the needs and trends brought by the rapid growth of technologies in the automotive industry.

Read more

India Releases Cybersecurity Guidelines for Power Sector

Credit to Author: Ericka Pingol| Date: Fri, 22 Oct 2021 00:00:00 GMT

A first in the sector, the latest scheme aims to enhance cybersecurity readiness and the overall efficiency of the country’s distribution companies.

Read more