Security issues in industrial markets have been receiving much attention in the media. The vast majority of devices that power infrastructures offer aging technology in many cases and are not well prepared for the latest cyber security threats. Taking the energy grid as an example: one does not have to be a scientist to find the holes when approximately 70% of the infrastructure is more than 30 years old. Devices that were never designed for […]
attack
Researchers from North Carolina State University and IBM have developed a new, experimental technique to better protect sensitive information in cloud computing – without significantly affecting the system’s overall performance. Under the cloud-computing paradigm, the computational power and storage of multiple computers is pooled, and can be shared by multiple users. Hypervisors are programs that create the virtual workspace that allows different operating systems to run in isolation from one another – even though each […]
Viruses and computer hacking have become common terms we all hear regularly in news reports and online. And while the concept of a virus is easy to understand, mainly because we are all taught how biological viruses work in our own body, it’s difficult to understand exactly what is going on during an attack inside your PC. What we need is a realistic visualization of exactly what is happening as an attack happens, and how […]