Blog

Cyber safety specialist hacked the drones

Indian cyber security expert Rahul Sasi (Rahul Sasi) was told about his way secretly to obtain full control of drones based on ARM Linux, steal them from the owner and even infect other drones, collecting thus the "zombie army". The results of the research he presented on January 26 in his blog.

According to the security officer of the Indian company Citrix Rahula Sasi, the threat of mass hacking of drones by real hackers. He found the vulnerability in operating systems on ARM based Linux is used in popular brands Parrot quadcopters and DJI Phantom.

The third digital war Part 1

During the last decade has been announced lots of predictions regarding what's going to be like prospective warfare, and also exactly what weapons it will likely be run. At the center of this zero has been developed a few apps such as its transformation of infantry components to separate electronic systems by means of augmented reality engineering. The app immediately power down, even offering the name of the majority of promising armed forces tech unmanned aerial cars. No pilots no casualties.

The third digital war Part 3

Rumors about a hundred thousand Chinese army hackers also difficult to consider exaggerated. In recent years in China, hacking has become a cultural phenomenon on a national scale. Hackers have not censured by the government and society, and became national heroes. The state finances the hacking competition, and the winners are recruiting for domestic surveillance of dissident minded citizens, and then for international cyber espionage.

Cybersecurity trends Part 1

This past year that the most important reason behind the delight of reefs around the entire world will probably be cyber security, pros state, and also that problem increases together with the maturation of the Web of matters and also the rising international freedom and inter connectedness.

Cybersecurity trends Part 2

Whenever these insights are incorporated together with "wearable" electronics, "complementary" simple as an instance, "bright eyeglasses" with electronic screens, we may eventually become "brand new job drive, that is made up of wise men and women", claims Valerie Riffo Kanelos, supervisor creation of fresh niches, the organization Epson.

This will definitely enable us to immediately solve endeavors, she stated, and also boost our productivity.

What is cyber security?

Returning into the field of cyber security plan, that commenced talking each calendar year, I do wish to interest quite an intriguing regular that clarifies that theory and its connection to additional, much more recognizable into the metro terms in these advice stability. We're speaking concerning. Info technology Security systems Strategies to cyber security, that has been embraced in July this past calendar year.

The history of smartwatches

The foundation of watches that are smart apparatus, revealing perhaps not merely timing, but in addition having any of those purposes of the personal computer that is perhaps not too young because it may seem to be at first glance. Modern electronics that can be issued by most businesses Pebble, Apple, Motorola, Samsung, obviously, far more operational original apparatus, that scarcely can securely insert to the prefix "sensible", nonetheless it's the tiniest indicated the start of accelerated creation with the specialized niche in electronic equipment.

The history of the server

The mainframe has performed the role of first servers

The server is an electronic device intended for maintenance access to the local or wide area network (files, data, databases, applications). The history server cannot be described only by a sequence specific dates as initially their functions were performed by large computers (mainframes), and then personal computers, then again separate computing system.

The history of computer networks

It would seem that it hasn't been that much time since the invention of the first computer, history of computer technology has already more than half a century. But in this article we are not talking about the computer or computer technology. We will talk about computer networks, without which it would have been impossible history of the Internet the most popular and most used as of today a virtual network connecting billions and billions of computers around the globe.

Pages