Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers

Static binary code scanning tools are good at finding obvious vulnerabilities in code, says Damon McCoy, an assistant professor in the computer science and engineering department at New York University. McCoy, who has not analyzed Jarvis, says BlackBerry may have a bit of an edge given its experience with embedded systems. But it’s also possible...

Post

With More Tech Comes More Hacking Risk for Smart Cars

Automakers and suppliers are making progress in protecting vehicles from cyberattacks, but the car-hacking threat is still real and could get increasingly serious in the future when driverless vehicles begin talking to each other. … Justin Cappos, a computer science professor at New York University’s Tandon School of Engineering, said one of the more promising...

Post

Car Hacking Remains a Very Real Threat as Autos Become Ever More Loaded With Tech

Automakers and suppliers are making progress in protecting vehicles from cyber attacks, but the car-hacking threat is still real and could get increasingly serious in the future when driverless vehicles begin talking to each other. … Justin Cappos, a computer science professor at New York University’s Tandon School of Engineering, said one of the more...

Post

The Worst Healthcare Cybersecurity Breaches of 2017

In 2017, a spate of high-profile attacks brought the healthcare industry’s need to strengthen its cybersecurity into sharp focus. Ransomware, like WannaCry and NotPetya, has wreaked havoc in small hospitals and biopharma giants alike, and the vulnerabilities appear widespread and acute, experts said. … “If you were hit by WannaCry, you were really doing something...

Post

2018: The Year Of Blockchain For Ad Industry?

Blockchain technology emerged in the advertising industry as a sort of phenomenon in 2017. Companies like IBM and Microsoft are betting big on the technology that seems to be pumping new life into some of the more established players and retailers, such as Oracle and Walmart. .. In July 2017, Google researchers reported that Chainalysis,...

Post

The Cyber and Critical Infrastructures Nexus: Interdependencies, Dependencies and Their Impacts on Public Services

Rae Zimmerman Critical infrastructures (CI) provide fundamental services in ways that are essential to the social and economic fabric of society. These infrastructures are apparently becoming increasingly interconnected with one another (Saidi et al. 2018: 1), and these interconnections appear in the form of interdependencies and dependencies. Information technologies or information and communications technologies (ICT)...

Post

A Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems

Fei Miao, Quanyan Zhu, Miroslav Pajic and George J. Pappas In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks. With the increasingly integrated properties of cyber-physical systems (CPS) today, security is a challenge for critical infrastructures. Though resilient control and...