The world as we know is constantly changing. The number of connected devices, i.e. devices with an internet connection, is growing faster than ever. By the year 2025, the number of connected devices is predicted to reach 40 billion units, with the number of IoT devices rapidly increasing (Statista 2020). In a world where everything and everyone is connected to the internet, there is a need for comprehensive digital regulations.
Despite the importance of cybersecurity in modern days, many companies don’t implement the newest cybersecurity practices or neglect the most efficient methods to ensure robust cybersecurity across the company.
The NIS 1 directive is one of the legislative measures introduced by the EU in 2016, which was met with positive anticipation. This directive aimed to enhance cyber resilience across the EU, especially within critical sectors such as healthcare, energy, and transportation etc. The directive proposed a common framework that would harmonize the level of cybersecurity among the member states.
Unmanned Aerial Systems (UAS) – or more commonly drones – have become very popular in the public and private sector. Armed forces, agricultural industry, law enforcement, meteorological agencies, medical services, environmental companies, and oil refineries are but a few of the users. The use of human activity adds huge value to the evolution of Unmanned Aerial Systems, but it also increases the security risks. Imagine what could happen if smart and cheap drones become weapons at the hands of criminals. Are drones a major threat when it comes to security, and if they are, what measures should be taken to counter them?
People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal more. They can also track your fitness activities and health.
Have you been curious what happens if you reply to junk mail? We at Centria SecuLab have tested it so that you do not need to! There is usually little or no danger in the process of receiving and opening a spam message, as long as no links are clicked, or any attachments are downloaded.
The market of intelligent machines, which includes autonomous robots, is growing rapidly (Pfeiffer S. 2016). The IFR report shows that over 3 million industrial robots are already operating in factories around the world (IFR 2021). Robots play a crucial role in our society, and they provide vital help in many different fields, such as the medical, industrial, and agricultural sectors.
Phishing campaigns often use the same formula. An email that contains a link or an attachment is sent to the recipient with the purpose of retrieving data by directing the user to some fake web page on the internet, or by executing a malicious code from an attachment. This text presents the HTML tactic that is used for phishing. The text also presents a few methods which are used to discover and prevent scam emails. Jatka lukemista ”Phishing affects us all”