article thumbnail

Once again, someone tampered with an entire drinking water supply via the internet

The Verge

You would think that something as critical as a town or county’s drinking water supply would be well-protected — you know, like how America’s nuclear armament was isolated from the internet and even relied on eight-inch floppy disks until just recently ? To keep the water safe, we also need to keep the water secure.

article thumbnail

How new public transportation technology is prioritizing passenger safety

CIO Business Intelligence

As technology has advanced, innovative and affordable solutions give public safety agencies the flexibility to update their current software and security measures to state-of-the-art programming and equipment. Learn how technology can help provide passenger safety and security in public transport.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Kevin Dreyer

SecureWorld News

By the early years in high school, I discovered how easily I could beat my brother's high score on video games by hacking the leaderboard, which gave me tons more time to learn other tricks and start connecting to people on bulletin boards over dialup before we got internet (I know, I'm old and not everyone had internet back then).

article thumbnail

Turns out that Florida water treatment facility left the doors wide open for hackers

The Verge

By now, you’ve probably heard the theoretically scary story of how hackers managed to infiltrate the computer systems at a water treatment plant in Oldsmar, Florida and remotely control the chemical levels — but it turns out that description gives the hackers far, far too much credit. The reality?

Chemicals 135
article thumbnail

How AI could spark the next pandemic

Vox

The first several pages of results for a Google search on how to build a bomb, or how to commit a murder, or how to unleash a biological or chemical weapon, won’t actually tell you much about how to do it. It’s not impossible to learn these things off the internet. How many lives does that save? That’s a hard question to answer.

article thumbnail

Timeline: How a Hacker Tried to Poison a City

SecureWorld News

The chemical burns through clogs, but can also burn your eyes and skin. That's why it is so disturbing that a hacker tried to poison a Florida city by spiking the local water with massive amounts of this chemical. It's important to note that lye (chemical name sodium hydroxide) is often present at very low levels in water systems.

article thumbnail

Embedded software development for IoT applications

Dataconomy

The world is becoming ever more interconnected; some are saying that it is ushering in a fourth industrial revolution, commonly referred to as the “Industrial Internet of Things.” Challenges and benefits of using embedded software in IoT systems The Internet of Things (IoT) has transformed the way we live and work.