Tag: Equipment
-
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could be exploited by malicious actors to obtain …
-
Crown Equipment cyberattack confirmed, manufacturing disrupted for weeks
Ohio-based Crown Equipment, which is among the largest industrial and forklift truck manufacturers in the world, has become a victim of a …
-
Cyberattack Defaces Israeli-Made Equipment at US Water Agency, Brewing Firm
The targets included the Equipment used by the Municipal Water Authority of Aliquippa, Pennsylvania and Brewmation, a New York-based …
-
Voting Equipment Giants Team Up For Security
In anticipation of the upcoming 2024 election, major US voting equipment manufacturers have announced an initiative to collaborate with …
-
Up Your Game: Top Gaming Equipment Recommendations for Competitive Players
When it comes to gaming, nearly everyone has their approach to it. While some enjoy titles with relaxing gameplay, others prefer worlds …
-
Agencies Are Compelled to Secure All Internet-exposed Equipment by CISA Orders
The American Cybersecurity & Infrastructure Security Agency (CISA) issued on June 13, 2023, a binding operational directive (BOD) requiring …
-
DNA Sequencing Equipment Vulnerability Adds New Twist to Medical Device Cyber Threats
A vulnerability in a DNA sequencer highlights the expanded attack surface area of healthcare organizations but also shows that reporting of …
-
The U.S. Bans the Sale of Huawei, ZTE, and Other Chinese Manufacturers’ Equipment
The Federal Communications Commission (FCC), on the behalf of the United States government, adopted new rules prohibiting the sale and …
-
Reinventing How Farming Equipment Is Remotely Controlled and Tracked
The agriculture industry doesn’t typically come to mind when thinking about sectors on the cutting edge. Yet it has been forging ahead …
-
California Law Enforcement Now Needs Approval for Military-Grade Surveillance Equipment. We’ll Be Watching.
The weapons of the United States military—drones, mobile command centers, sound cannons, and more—have been handed off to local law …
-
A Bottom-Up Approach to 5G Network Slicing Security in User Equipment
Securing 5G UE products against cyber threats requires a “bottom-up” approach where security is an integral part of the design that …
-
Power Equipment: A New Cybersecurity Frontier
Power management may not be at the top of anyone’s priority list when they think about cybersecurity. But to quote the famous words of Bob …
●●●