Posts

COVID-19

How Are Technologies Used to Fight Against COVID-19? How Secure Are They?

Four months into the outbreak, COVID-19 shows no sign of dying…
Smart City

Building Smart Cities From Big Data

Since the introduction of smartphones, the term “smart” has…
powerplant

Are Your Country's Canals, Dams, and Power Plants Safe from Hackers?

In 1999, a 16-inch fuel line ruptured in the US spilling…
Smart Office

Fancy Devices for the Office and Corporate Security

The smart workplace  The internet of things (IoT) has…
iot m2m image

How Will Machine to Machine (M2M) and IoT Change the Future?

M2M is direct communication between devices using any communications…
Autocrypt future

Securing the Road to the Future

What is the ITF and the CPB?   The International Transport…
Healthcare

How Big Data is Transforming the Healthcare Industry

The evolution of healthcare  What comes to mind when…
Cloud Security penta

How Can Hackers Break into Cloud-Locked Phones?

In recent years, both individuals and businesses have been using…
JAN Week 4_Security Weekly (2)

[Security Weekly] Microsoft Security Breach Exposed Records of 250 Million Customers

4th Week of January 2020   1. Microsoft discloses security…
EV charging

IoT, Connected Car, and ‘Transport Security’

As the IoT technology advances, we start to wonder if the security…