In a thorough investigation of gas pumps that use the Guardian aboveground storage tanks (AST) monitoring system in the United States, threat researchers Kyle Wilhoit and Stephen Hilt found one particular unit that has been tampered with.
This Trend Micro paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
Another existing widespread vulnerability known as Shellshock has been found, threatening to compromise millions of systems, servers and devices. What is it, who is affected, and what can you do?
In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
Smart grids are power grids with digital capabilities. Given the widespread control smart grids hold over public utilities, attackers are likely to target them to gain power or extort money.
Smart meters are already installed in many cities across the globe. As more homes are installed with smart meters, homeowners should be aware of the possible risks they may bring.
While network-connected smart grids and meters bring new, convenient features to the table, they also expose consumers to cybercrime. Here, we present the various scenarios by which smart meters can be attacked.