USB quick charging and Honor 8

Modern smart phones use lots of powr, have high capacity batteries and many people want that they can be charged quickly. Fast charging is a name for battery charging technologies that charges the battery faster that normally by increasing the charging power. The standard USB charging is somewhat complicated enough with several standard versions and

Cyber risks for Industrial environments continue to increase Industrial control systems (ICS) are a privileged target of different categories of threat actors. Researchers observed a significant increase of brute force attacks on supervisory control and data acquisition (SCADA) systems. In December, IBM warned of the availability of a penetration testing framework named smod that was used in many attacks in the wild.  Organization in any industry can

Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market – IEEE Spectrum Unlike counterfeit electronics of the past, modern clones are very sophisticated.  The counterfeiters make their own components, boards, and systems from scratch and then package them into superficially similar products. The clones may be less reliable than the genuine product, having never undergone rigorous testing. But they may also host unwanted or even malicious software, firmware,

Embedded Systems Safety & Security Survey

Information security issues are in this Internet of Things era very important for embedded systems developers. You need information from many sources, and one valuable information source are surveys made by differet companies. For the third year in a row, Barr Group has conducted its annual Embedded Systems Safety & Security Survey of embedded systems designers in

Critical infrastructures under daily attack — EU cyber security team head ‘Critical infrastructures around the world, not just in Europe, are constantly being targeted by cyber attacks, as are many other systems used by society which are internet-connected. Every day, European vital services and infrastructures have to be able to resist many types of cyber attacks. ‘The risk of attacks against such infrastructures is expected