EMERGING TECHNOLOGIES

The popular home automation protocol Z-Wave, used by millions of IoT devices, is vulnerable to a downgrade attack that could allow an adversary to take control of targeted devices, according to researchers. Z-Wave is a wireless protocol used by 2,400

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern cyber threats. Microsoft provided the recent Triton and NotPetya attacks as examples of significant threats hitting critical infrastructure. Triton was

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies

Spanish-based international bank Santander confirmed the launch of its Ripple-powered Blockchain payment network Thursday, April 12, becoming the first bank to do so. One Pay FX, which uses Ripple’s Blockchain technology to cut the cost and waiting time associated with

Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices. “As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts,” its creator, who goes by