We’re hitting rock bottom in cyber — let’s do something | TechCrunch When it comes to the cybersecurity problem, where is rock bottom? Was it WannaCry, a ransomware attack. Or similar and perhaps even worse attack that hit just weeks later? Was it the Yahoo breaches? Or Equifax and Uber? Intel and Apple leaving our computer management accounts wide open? Banking computer systems hacked and many millions stolen? Or critical infrastructure hackers

EMF meter GM3120

Have you ever wondered about how safe your place or position is regarding electromagnetic and magnetic fields? Then here is your chance to find out. Everyone is exposed to a complex mix of weak electric and magnetic fields, both at home and at work, from the generation and transmission of electricity, domestic appliances and industrial

Report Scores Cities to See if Technology Makes Them Safer – IEEE Spectrum  More and more people are migrating to cities. By 2030, 60 percent of the world’s population will live in an urban setting, according to the United Nations. How can these growing cities reduce conflicts, crime, violence, and terrorism? In a word: technology. 

These Explosions Show Why the FAA Doesn’t Want Laptops in Luggage The US government wants a “laptop ban” on planes. But this time, it’s to prevent fliers from putting large electronics, like laptops, into their checked luggage. Is it safe to stow electronics—especially those with lithium-ion batteries—in cargo holds? It seems that lithiun-ion batteries combined with some other flammable items in cargo can make a very dangerous flammable

Securing smart grid and advanced metering infrastructure  During the recent years, there have been two cyber-attacks on power plants in Ukraine, which for the first time in the history succeeded to disrupted and cut power in a country.  An analysis of the events in Ukraine indicates that in order for a cyber-attack to materialize, three conditions must exist: opportunity, ability, and motivation.

Banana connector types A banana connector is a single-wire (one conductor) electrical connector used for joining wires to equipment. The term 4 mm connector is also used, especially in Europe,because the pin’s diameter is nominally 4 millimetres (0.16 in).The pin has one or more lengthwise springs that bulge outwards slightly, giving the appearance of a banana. The original plug consists of a cylindrical metal pin about 20 millimetres (0.79 in) long.However other

ICS Companies Are Worried About Cybersecurity, But Are They Worried About Right Things? The equipment was expected to be installed and left alone for a long time. Pressures to reduce operating costs led to this equipment being connected, and the easiest networking equipment to find was designed for convenience in a corporate environment — not security in an ICS environment.  This has led to the current situation where malware