HackDig : Dig high-quality web security articles for hackers

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all over the world.This characteristic might serve organizations’ evolving business needs as they pursue their
Publish At:2020-08-25 01:55 | Read:371 | Comments:0 | Tags:Internet of Things Cloud IIoT infrastructure secure configur

IoT Attack Opportunities Seen in the Cybercrime Underground

By Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho In our paper “The Internet of Things in the Cybercrime Underground,” we looked into IoT-related discussions from several cybercrime underground communities. We found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. Unsurprisingly, ex
Publish At:2019-09-19 14:50 | Read:1165 | Comments:0 | Tags:Internet of Things cybercrime underground iiot industrial in

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

By Jonathan Andersson and Federico Maggi Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses. We believe that RF security research is of great import
Publish At:2019-09-19 14:50 | Read:2264 | Comments:0 | Tags:Internet of Things iiot IOT radio frequency RFID Software De

More than 90% of IT Pros Expect More Attacks, Risk, and Vulnerability with IIoT in 2017

The Internet of Things (IoT) embodies great promise and risk. On the one hand, ordinary users view IoT as a means of streamlining their activities across billions of “smart” devices. They hope such connectivity will ultimately translate into better and easier lives. On the other hand, IoT devices aren’t always designed with security in mind
Publish At:2017-03-13 16:15 | Read:4584 | Comments:0 | Tags:Featured Articles ICS Security IIoT IT OT Vulnerability

Two-Thirds of Orgs Don’t Have a Strategy to Protect Their Endpoints, Study Reveals

In the information age, an organization is nothing without its critical endpoints. Those network systems function as the cornerstones of a corporate IT network and, as such, are crucial to maintaining smooth business flow. Without them, a company could suffer fiscal and/or operational consequences.Critical endpoints come in many shapes and sizes. Traditional
Publish At:2016-10-11 01:55 | Read:4083 | Comments:0 | Tags:Off Topic endpoints ics IIoT Internet of Things IoT

5 Key Challenges for the Industrial Internet of Things (IIoT)

The Internet of Things (IoT) is one of the most significant trends in technology today. A melding of innovations in the fields of computing and communication, IoT and its “smart” devices are poised to revolutionize not only user-machine interaction but also the way in which machines engage with one another.Already we are beginning to see the perm
Publish At:2015-12-03 04:25 | Read:4347 | Comments:0 | Tags:Featured Articles ICS Security IoT ICS security IIoT Key Cha

On Tripwire and the Future of Security: A Letter from Tripwire’s President

I have been in the field of security for over two decades. During this time, I have seen solution providers deliver increasingly feature-rich and sophisticated products, solutions and services, enabling organizations to be more secure. Furthermore, I’ve seen many companies change their entire approach to cyber security – companies that, for the most part, fi
Publish At:2015-12-01 16:15 | Read:5222 | Comments:0 | Tags:Featured Articles Tripwire News Belden Cyber Security IIoT P

The Industrial Internet of Things: Fueling a New Industrial Revolution

A transformative event is occurring where countless industrial devices, both old and new, are beginning to use Internet Protocol communication technologies.We refer to these collections of IP-enabled industrial devices and associated networks as the Industrial Internet of Things (IIoT). The Industrial IoT is at the very core of disruptive visions, such as In
Publish At:2015-11-30 04:05 | Read:5377 | Comments:0 | Tags:Featured Articles ICS Security IoT Devices IIoT Industrial P

How Can We Keep Industrial Internet Systems Secure?

The Industrial Internet is on the verge to becoming the largest disruption to the global economy since the Internet revolution in the 1990s. According to GE, it will have a $32.2 trillion impact, representing 46 percent of today’s GDP.As the Industrial Internet continues to grow and have an impact on the way we work and live, it is imperative that industry p
Publish At:2015-11-02 08:40 | Read:7523 | Comments:0 | Tags:Featured Articles ICS Security IIoT Industrial IoT security

Tools

Tag Cloud