In a thorough investigation of gas pumps that use the Guardian aboveground storage tanks (AST) monitoring system in the United States, threat researchers Kyle Wilhoit and Stephen Hilt found one particular unit that has been tampered with.
This Trend Micro paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
While network-connected smart grids and meters bring new, convenient features to the table, they also expose consumers to cybercrime. Here, we present the various scenarios by which smart meters can be attacked.