• 5G & AI Smart City Privacy AI

    The Future of Privacy in our Smart Living

    It is inevitable and important that human society moves towards a smarter way of living. We must use intelligent ways to improve our infrastructure and its dependencies. To do this we have to share our personal information, from direct to indirect identifiers. At some point, in a not too distant future, it is likely our every moment, both awake and asleep, will be recorded. Does this matter? Do we really care?

    Read More »
  • Cyber-Kinetic Security Stuxnet Cyber-Physical Weapon

    Stuxnet and the Birth of Cyber-Kinetic Weapons

    Stuxnet was the first true cyber-kinetic weapon, designed to cripple the Iranian – and perhaps also the North Korean – nuclear weapon programs. It succeeded in slowing the Iranian program, although it was discovered before it could deal the program a fatal blow. Its significance goes far beyond what it did. It marks a clear turning point in the military history and cybersecurity. Its developers hoped for a weapon that could destroy strategic targets without…

    Read More »
  • 5G & Massive IoT Business fog iot security telcos

    How Telecom Operators Can Strike Back with IoT, Fog & Cyber

    Telecom operators sat back as the new over-the-top (OTT) service providers, internet and tech companies slowly ate away at their business, particularly in the B2C space. A combination of institutional laziness and poor execution on promising initiatives gave these new entrants the time to jump in and snatch away customers. At the moment, the future doesn’t look too bright either with a worldwide CAGR put at 0.7 percent through to 2020. For the time being,…

    Read More »
  • Cyber-Kinetic Security Maritime Cybersecurity

    Navigating a Safe Course Through Maritime Cyberattacks

    The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on facing – and overcoming – risks. But, as technology increasingly dominates it, growing risks exist that the industry dare not ignore. Its growing effort to increase efficiencies through digitization and automation has made it an…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Threat

    Our Smart Future and the Threat of Cyber-Kinetic Attacks

    A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure would cripple modern society. It’s easy to watch such shows and pass off their plots as something that could never happen. The chilling reality is that those plots are often based on real cyber-kinetic threats that either have already happened, are already possible, or are dangerously close to becoming reality. Cyberattacks…

    Read More »
  • Smart Cities Smart Cities

    Whispering Buildings and Things That Listen to Us in the Night

    How important privacy is for building smart cities and embracing the IoT In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video calling. The Jetsons city of the future is with us in the here and now as we have the technology to build smart cities, and in doing so, we can create amazing places to live…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Attacks History

    History of Cyber-Kinetic Incidents and Research

    The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts in understanding the full scope and recognizing the trends in this growing problem. We’ll highlight examples of cyber-kinetic incidents and attacks in this chapter. Some were malfunctions that, nonetheless, demonstrated cyber-physical system vulnerabilities. Some were…

    Read More »
  • RESOURCES Cyber-Kinetic Timeline

    Timeline of Key Cyber-Kinetic Attacks, Incidents & Research

    Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and Industrial Control Systems (ICS) resulting in kinetic impacts in the physical world. I tried to select only those that were first-of-the-kind or that significantly increased general awareness about a particular type of an attack or incident I know that the list is incomplete. That’s where you come in. If you are…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Robot

    When Hackers Threaten your Life – Cyber-Kinetic Risks

    The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in the driveway at the front of the house, a bright…

    Read More »
  • IoT Networks IoT Protocols Speed Range

    IoT Wireless Protocols – Speed & Range – Comparison Chart

    IoT Wireless Protocols data rate and range comparison in a chart.

    Read More »
  • RESOURCES Security Standards Regulations Guidelines

    Emerging Tech Security Guidelines, Frameworks, Standards

    Below is my attempt to list of all published 5G, IoT and “Smart Everything”-related security guidelines, frameworks and standards. If you are aware of additional entries that should be here, please let me know at [email protected]

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Security, IoT Security, OT Security

    The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

    We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those…

    Read More »