Could home appliances knock down power grids?

Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix. Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, … More Could home appliances knock down power grids?

Smart irrigation systems vulnerable to attacks, warn researchers

Internet-connected irrigation systems suffer from security gaps that could be exploited by attackers aiming, for example, to deplete a city’s water reserves, researchers warn. Security researchers have warned of a potential attack that – using a “piping botnet” of internet-connected irrigation systems that water simultaneously – could impact a city’s water system to the point of … More Smart irrigation systems vulnerable to attacks, warn researchers

Interviewing ESET’s experts about the Web’s journey so far

What has the journey of the World Wide Web been like so far, as seen and experienced by ESET’s security folk? ESET Senior Research Fellow David Harley provides his take in the first installment of our series of interviews marking the Web’s 27th birthday. On August 6, 1991, English computer scientist Tim Berners-Lee publicly announced … More Interviewing ESET’s experts about the Web’s journey so far

Wi-Fi or Ethernet: Which is faster and which is safer?

There is a lot of debate about Wi-Fi speeds and whether they can offer higher potential speeds than a cable connection, but in practice Ethernet connections turn out to be not only faster but also safer. The era of technology we exist in leads us (and in some cases forces us) to be connected at … More Wi-Fi or Ethernet: Which is faster and which is safer?

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices