Hacker Eldorado IoT: Security Risks in the Internet of Things
2016 was an extremely thrilling year for IT security experts. A controversial hacking discussion surrounded the US election and even outside of politics, high-profile attacks on IT systems were manifold. What many hacks had in common was th...
Standard IoT Security Solution Offers Protection Against Hackers
Industry 4.0 and the Smart Factory promise a boost for innovation in the production sector. However, corresponding IoT security measures are still only beginning to develop, according to a study by the German Federal Ministry for Economic A...
Kontron Security Solutions: Embedded Systems Safe and Sound  
When I started working in the embedded computer market in 2004, except for a few select customers in the defense sector of the industry, it was absolutely oblivious to security vulnerabilities. The ever increasing importance of connected sy...
IoT Security: Is the State Device ID a Good Idea?
The Internet of Things is a whole new infrastructure which of course leads to a number of challenges that must be addressed. In Germany there are plans for an “Identity Safety Act” that should protect this new infrastructure. Right now,...
Wi-Fi in Aircraft: Are we Safe from Hacker Attacks or Hijacking?
An increasing number of airlines offers „On-Board Wi-Fi“ to their passengers with connectivity improvements to the aircraft while it is on the ground (3G/4G LTE) and in-flight (air-to-ground and air-to-satellite). This develop...
Internet of Things and Security: Mission impossible?
The internet of things (IoT) will be the next step in integrating even more of the real world into the web. With this step companies and consumers will be facing billions of insecure devices because of the inadequate security meas...
Secure Gaming Machines: Wanna bet on it?
Ever since the gaming industry introduced electronic video slot machines and subsequently other electronic gaming formats, the game designers have been in pursuit of that next best irresistible game that will attract and intoxicate players ...
How do you feel today?
Being a computer person, I usually do not see technology like a form of black magic. Whenever I consider even the most complex system, I can imagine all the small pieces and the collection of techniques humming within this marvel.  Aft...
Air-condition with built-in backdoor
It’s really surprising what you hear in M2M (Machine-to-Machine) groups. Last time I read an unbelievable data point: 55,000 air-condition or heating systems are connected to the Internet without adequate (or any) protection  Due to...

Stay connected