How Will Blockchain Technology Be Leveraged To Solve Un’s 17 Sustainable Development Goals? Can It Help Solve The World’s Most Pressing Social And Environmental Problems?

How Will Blockchain Technology Be Leveraged To Solve Un’s 17 Sustainable Development Goals?

With the arrival of Blockchain technology and its potential to disrupt the status quo, we have a relatively new ‘fix’ (or at least some bandaids)…

View More How Will Blockchain Technology Be Leveraged To Solve Un’s 17 Sustainable Development Goals?
Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Security researchers have disclosed details today about 11 vulnerabilities known collectively as “Urgent11” that impact a wide range of devices, from routers to medical systems,…

View More Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices
Harnessing DIY IoT to Manage Type 1 Diabetes

Harnessing DIY IoT to Manage Type 1 Diabetes

Early last year, my family was thrust quite suddenly into the world of type 1 diabetes (T1D). We spent almost a week in the hospital…

View More Harnessing DIY IoT to Manage Type 1 Diabetes
NSA: Turn off these smartphone features if you want your location to stay secret

NSA: Turn off these smartphone features if you want your location to stay secret

The U.S. National Security Agency has urged the Department of Defense and other national-security personnel to deactivate Bluetooth, Wi-Fi and GPS on their phones if…

View More NSA: Turn off these smartphone features if you want your location to stay secret
Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Not all cyberattacks focus on data theft. Sometimes the intent is “to achieve the destruction of the physical world through digital means,” Chinese tech giant…

View More Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works
Bug in Anesthesia Respirators Allows Cyber-Tampering

Bug in Anesthesia Respirators Allows Cyber-Tampering

A vulnerability in GE Healthcare’s Aestiva and Aespire anesthesia devices would allow an unauthenticated cybercriminal on the same network as the device to modify gas…

View More Bug in Anesthesia Respirators Allows Cyber-Tampering
Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Millions of devices, from consumer products like printers and IP cameras to specialized devices used across organizations such as video conferencing systems and industrial control…

View More Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries
This Is 'Shakti', The 1st Ever 'Made In India' Computer Chip Developed And Built By IIT Madras

This Is ‘Shakti’, The 1st Ever ‘Made In India’ Computer Chip Developed And Built By IIT Madras

The Indian Institute of Technology in Madras, last week, made a hallmark breakthrough for Indian computing. A group of engineers from the institute has managed…

View More This Is ‘Shakti’, The 1st Ever ‘Made In India’ Computer Chip Developed And Built By IIT Madras
Consumers Urged to Junk Insecure IoT Devices

Consumers Urged to Junk Insecure IoT Devices

More than 2 million connected security cameras, baby monitors and other IoT devices have serious vulnerabilities that have been publicly disclosed for more than two…

View More Consumers Urged to Junk Insecure IoT Devices
The 3 Basic Concepts of MQTT Security

The 3 Basic Concepts of MQTT Security

Light bulbs, locks, thermostats and appliances are now designed with network connectivity in mind. One day soon, the majority of such once-isolated devices could become…

View More The 3 Basic Concepts of MQTT Security