Tim Groenwals

176 Flips | 2 Magazines | 8 Likes | 9 Following | 125 Followers | @tgroenwals | CISO of Belgian Rail

Cybercrime on the high seas: the new threat facing billionaire superyacht owners

Buyers at London superyacht conference shown the ease with which hackers can take control of vessels – and even procure private photos<p>Within a few hours of mooring up and opening his laptop, Campbell Murray had taken complete control of a nearby multimillion-dollar superyacht.<p>He could easily have …

Super Yachts

How an IoT DDoS warning system helps predict cyberattacks

Cybercriminals are leveraging vulnerable IoT devices to create massive DDoS botnets. Researchers have devised a platform for early warning and …

Building an AI Chip Saved Google From Building a Dozen New Data Centers

Google operates what is surely the largest computer network on Earth, a system that comprises custom-built, warehouse-sized data centers spanning 15 …

US child hacker confesses to launching cyber attack on Brussels Airport hours after Isis attacks

An American child has admitted launching a cyber attack targeting Brussels Airport in the wake of Isis suicide bombings that killed more than 30 …

Europol: Ransomware now top cybercrime threat

PARIS (AP) — European police agency Europol says the threat from ransomware has now eclipsed other forms of online theft, a sign of how quickly the …

Ransomware

The Blink home security system offers peace of mind at a price you can afford

It’s an age-old adage, but one whose sentiment has withstood the test of time — a lot can happen in the blink of an eye. Luckily, the 21st century …

Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake'

SAN FRANCISCO/WASHINGTON (Reuters) - A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the …

Making cybersecurity a priority in mergers and acquisitions: integration

The change inevitable in a post-deal situation makes the new company a ripe target for cyber criminals, who often capitalize on the security …

Mergers & Acquisitions

Millions of Volkswagens Can Be Unlocked by Hackers

Millions of Volkswagen cars could in principle be unlocked from a distance by hackers, according to a new report. It’s one more strike against a …

Security Vulnerabilities in Wireless Keyboards

Most of them are unencrypted, which makes them vulnerable to all sorts of attacks:On Tuesday Bastille's research team revealed a new set of wireless …

Information Security

Even your battery status may threaten your privacy online

Most Internet users probably know they can be tracked and targeted based on what they search for and which websites they visit.<p>But it turns out that even the battery charge level on our phones and laptops may be giving away personal information.<p>That, at least, is according to a new paper on online …

Princeton University

Xerosploit

Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that …

Pwnie Express makes IoT, Android security arsenal open source

The software should help penetration testers identify and locate threats to Internet of Things (IoT) devices.<p>Pwnie Express has given the keys to …

The bar for digital experience is rising in exponential times

Most companies are still plugging away, digital channel by digital channel, at creating the experiences they think their customers expect. But the …

The most interesting thing about Philips' new health gadgets is their FDA status

Forget about fashion aesthetics and the squishy parameters of “fitness goals.” Today Philips enters the U.S. connected health market with five new gadgets, and while the devices aren’t particularly innovative—or even pretty—they do have one feature that less trend-conscious consumers may care …

Game of Thrones can teach you valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of …

Game of Thrones

Smartwatch Movement Data Could Give Away PINs

A team of computer scientists say "fine-grained" hand-movement data recorded by smartwatches could put PIN numbers at risk.<p>Smartwatch owners have …

U.S. issues first government guide on responding to cyber attacks

WASHINGTON/NEW YORK (Reuters) - The White House on Tuesday issued the U.S. government’s first emergency response manual for a major cyber attack, though some officials acknowledged it lacked clear guidance on possible retaliation against hacker adversaries.<p>A lock icon, signifying an encrypted …

Amazon patents noise-canceling headphones that let you hear the important stuff around you

Noise-canceling headphones are great for tuning out the din around you when you just want to focus on listening to music or enjoy some peace and quiet. Unfortunately, they also mute sounds that you might need to hear – like someone calling your name.<p>Amazon has a pretty cool idea for solving that …

Headphones

EU Parliament gets tough on data protection, adopts GDPR

Who's serious about data protection? The EU.<p>Just a day after the Article 29 Working Party found the Privacy Shield pact inadequate and recommended …

Data Protection

MIT’s AI Can Predict 85 Percent of Cyberattacks

Knowing a cyberattack’s going to occur before it actually happens is very useful—but it’s tricky to achieve in practice. Now MIT’s built an …

Read only: Books CISOs ought to have

There are just over 490 cyber security books listed on Amazon in the computers and technology section.<p>Some are keepers. No doubt some of them — …

The BYOD predicament: Are smart devices an easy target for hackers?

With BYOD uptake on the rise in 2016, unsecured mobile devices pose a risk to UK firms. The number of personal laptops, smartphones, tablets, and …

Mobile Devices

IDG Contributor Network: Security can be a competitive differentiator

Technology has always been an innovative means to leverage competitive advantage in the marketplace. Technology has essentially provided the next …

Innovation

The Do’s and Don’ts of Running an Ideation Program

One of the first misses in an employe ideation system is not tracking ideas in the first place. There are a few reasons that this is important. …

Brainstorming

Strata + Hadoop World: Driving innovation with open data

Many organizations are setting a course to meet the imperative of applying cloud-based analytics and open data to innovate lines of business and gain …

34 Remarkable and Surprising Things About The Future

I’ve been reading and thinking about the future a lot recently, and decided to spend a week “nerding out” at Singularity University, to satisfy my …

People are (still) the biggest security risks

"We're battling thousands of years of evolution," says Kevin Epstein, vice president of the Threat Operations Center at Proofpoint. "It's natural to …

Ransomware hackers steal a hospital. Again.

A month after a hospital in Hollywood was shut down by a ransomware infection that encrypted all the files on its computers and computer-controlled …