Another existing widespread vulnerability known as Shellshock has been found, threatening to compromise millions of systems, servers and devices. What is it, who is affected, and what can you do?
The last post in the series discusses High-Risk/Low-Feasibility attacks, which is the most damaging of the three attack scenarios.
In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
Smart grids are power grids with digital capabilities. Given the widespread control smart grids hold over public utilities, attackers are likely to target them to gain power or extort money.
Smart meters are already installed in many cities across the globe. As more homes are installed with smart meters, homeowners should be aware of the possible risks they may bring.
While network-connected smart grids and meters bring new, convenient features to the table, they also expose consumers to cybercrime. Here, we present the various scenarios by which smart meters can be attacked.