Editorial

SCADA Systems security -just how important is it?
Editorial SCADA Systems security -just how important is it?

SCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance with

Embedded risks – when vulnerable circuits threaten IoT
Editorial Embedded risks – when vulnerable circuits threaten IoT

In a pioneering move, cyber-security expert Bruce Schneier approached the risks linked to embedded systems as early as January 2014. Embedded systems cyber-security raised a certain amount of interest in 2015, and will represent an even hotter topic in 2016. Taking a broad view on what embedded

Malvertising:  what is it and how to browse safely
Editorial Malvertising: what is it and how to browse safely

Malvertising is the assigned term for malicious advertising , which represents the action of hijacking legitimate online advertising networks performed by malicious factors in order to inject their own malware-ridden advertisements into the said platforms. The usual shape malvertising takes is that

Assembling your personal key – how to set a strong password
Editorial Assembling your personal key – how to set a strong password

All good passwords have to meet a double condition: hard to guess, yet unforgettable in what their owner is concerned. Even more, how do you achieve that? Obviously, many password users fail at choosing the best virtual key for their accounts. Yet another password secret relies in seeing the

2015’s (cyber) seven – the most notorious data breach examples of the year
Editorial 2015’s (cyber) seven – the most notorious data breach examples of the year

This year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the cyber-data black

Should cyber-crime be afraid of machine learning?
Editorial Should cyber-crime be afraid of machine learning?

Searching for the optimum cyber-security defense configuration lead to the idea of employing machine learning in this field. Enterprises and researchers have regrouped their strategies in the aftermath of each and every notorious breach and attack, only to realize that this move will have to repeat

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later