Solar Panel Flaws Put Power Grids at Risk: Researcher

A researcher has identified many vulnerabilities in widely used solar power systems and he believes some of these flaws could allow hackers to cause large-scale outages, but the affected vendor says his claims are exaggerated. In a scenario he calls “Horus,” which stems from the name of the ancient Egyptian god, researcher Willem Westerhof describes…

It’s time for security leaders to challenge dogma

What are the key elements of a good security program? Why did you answer that way? Seems a lot of security is ‘handed-down’ knowledge. We pride data and evidence-driven decisions while suggesting security is too hard to measure and pin down. Curious, no?

Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from our phones, or ask into the air any question, to be answered immediately by a robot sitting on a countertop. “Okay, Google — what do I have…

Hacking Factory Robot Arms for Sabotage, Fun & Profit

Black Hat talk will discuss how hackers could take over robotic arms, create micro-defects in products, and open up a new world of subtle blackmail. Security researchers have been accumulating a trove of breakthrough discoveries on Industrial Internet of Things (IIoT) vulnerabilities and releasing them at the Black Hat Briefings over the last few years…

Top 4 Software Development Methodologies

Successful projects are managed well. In order to manage a project efficiently, the manager or dev team must choose which software development method works best for the project at hand. All of the numerous software development methodologies that exist are used for different reasons. I’ve been doing some research to understand why different methodologies exist,…