SCADA And Mobile Security In The Internet Of Things Era
From the report, “Two years ago, the authors assessed 20 mobile applications that worked with ICS software and hardware. At that time, mobile technologies were widespread, but IoT mania was only beginning. (more available)
Smart Cities Cyber Security Worries
This infographic provides insight into the cyber security worries of Smart Cities.
Commonalities in Vehicle Vulnerabilities
This paper is a follow-up to IOActive’s 2016 report1 on vehicle vulnerabilities. The goal of this paper is to revisit the topic using data from the past two years (2016, 2017) and to compare this information to previous findings to analyze how the industry is progressing. (more available)
Are You Trading Stocks Securely?
This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available)
Hacking Robots Before Skynet
From the Report, “This paper is based on our own research, in which we discovered critical cybersecurity issues in several robots from multiple vendors. (more available)