Safety

Industrial IoT seminar – Nohau Solutions

I visited today NOHAU seminar on industrial IoT and security related to it. The seminar content was in mixed Finnish and English language: Seminaari: Varaudu kyberhyökkäyksiin – Miten liität sulautetun laitteen turvallisesti internettiin? http://nohau.fi/events/hyodynna-ja-hallitse-teollinen-internet/ Ohjelma: 8.30   Aamupala ja rekisteröinti (breakfast and registration) 8:45   Tervetuloa – Nohau (wellcome) 9:00   Teollisen internetin businessmahdollisuudet, Jukka Nurmi, Director, IoT

Inside an isolated RS-485 transceiver | EDN

http://www.edn.com/design/analog/4458434/Inside-an-isolated-RS-485-transceiver?utm_content=buffer1c35d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Over the past decade, legislation has changed and now requires machinery and equipment operating in harsh environments to implement isolation for their data transmission systems. As a result, the trend away from legacy single-channel isolated systems to applications utilizing multi-channel isolation has led to the introduction of new isolation components. Many of these applications

USB quick charging and Honor 8

Modern smart phones use lots of powr, have high capacity batteries and many people want that they can be charged quickly. Fast charging is a name for battery charging technologies that charges the battery faster that normally by increasing the charging power. The standard USB charging is somewhat complicated enough with several standard versions and

Cyber risks for Industrial environments continue to increase

http://resources.infosecinstitute.com/cyber-risks-industrial-environments-continue-increase/ Industrial control systems (ICS) are a privileged target of different categories of threat actors. Researchers observed a significant increase of brute force attacks on supervisory control and data acquisition (SCADA) systems. In December, IBM warned of the availability of a penetration testing framework named smod that was used in many attacks in the wild.  Organization in any industry can

Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market – IEEE Spectrum

http://spectrum.ieee.org/computing/hardware/invasion-of-the-hardware-snatchers-cloned-electronics-pollute-the-market Unlike counterfeit electronics of the past, modern clones are very sophisticated.  The counterfeiters make their own components, boards, and systems from scratch and then package them into superficially similar products. The clones may be less reliable than the genuine product, having never undergone rigorous testing. But they may also host unwanted or even malicious software, firmware,

Embedded Systems Safety & Security Survey

Information security issues are in this Internet of Things era very important for embedded systems developers. You need information from many sources, and one valuable information source are surveys made by differet companies. For the third year in a row, Barr Group has conducted its annual Embedded Systems Safety & Security Survey of embedded systems designers in