Is there a risk on your wrist?

Tom Tuunainen

People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal more. They can also track your fitness activities and health.

Jatka lukemista ”Is there a risk on your wrist?”

Junkmail conversations

Olli Isohanni

Have you been curious what happens if you reply to junk mail? We at Centria SecuLab have tested it so that you do not need to! There is usually little or no danger in the process of receiving and opening a spam message, as long as no links are clicked, or any attachments are downloaded.

Jatka lukemista ”Junkmail conversations”

The Cybersecurity of Robotic Systems

Tom Tuunainen

Controlling a robot from a tablet computer

The market of intelligent machines, which includes autonomous robots, is growing rapidly (Pfeiffer S. 2016). The IFR report shows that over 3 million industrial robots are already operating in factories around the world (IFR 2021). Robots play a crucial role in our society, and they provide vital help in many different fields, such as the medical, industrial, and agricultural sectors.

Jatka lukemista ”The Cybersecurity of Robotic Systems”

Phishing affects us all

Olli Isohanni

Illustration

Phishing campaigns often use the same formula. An email that contains a link or an attachment is sent to the recipient with the purpose of retrieving data by directing the user to some fake web page on the internet, or by executing a malicious code from an attachment. This text presents the HTML tactic that is used for phishing. The text also presents a few methods which are used to discover and prevent scam emails. Jatka lukemista ”Phishing affects us all”