Robot safety – Top safety solutions for robotic workstations
Human safety is one of the most critical aspects of designing a robotic workstation that involves human-robot interactions (HRI). Robots manipulate dangerous tools and...
How can small businesses level up their cybersecurity?
Starting a small business today might be easy for anyone out there, but this doesn’t mean that running it will be effortless!
There are many...
Armed drones for national defence and security – Pros and cons
Drones, also known as Unmanned Aerial Vehicles (UAVs), Remotely Piloted Vehicles (RPVs), or Remotely Operated Aircraft (ROAs), play a prominent role in military operations,...
8 most popular ransomware against high-profile business targets
One of the earlier cases of ransomware infection was first reported in Russia between 2005 and 2006. Since then, ransomware has rapidly become one...
Game of drones: Big security and privacy threats and concerns
Ever since the first commercial drone was demonstrated at the Consumer Electronics Show (CES) in 2010, drones or unmanned aircraft systems (UAS) have shown...
Mitigating ransomware attacks at your business – A complete guide
Among all the malware that attacks people's data, ransomware happens to be one of the worst! Its impact is immediate and can result in...
How Virtual Private Networks (VPN) create big holes in your cybersecurity
Have you ever wondered what the digital world is like today? It is the hub of all knowledge, but yet, it comes with many...
Anti-drone systems: Interview with Lucas Le Bell, CEO of CERBAIR
The use of drones or unmanned aerial vehicles (UAVs) generates heavy deliberation and debate over the malicious uses of the technology, which can potentially...
How to prevent brute-force attacks on Remote Desktop Protocol (RDP)
The number of people working from home has risen astronomically this year due to COVID-19. Consequently, numerous companies have been reliant on remote desktop...
Top security risks of dedicated short-range communication (DSRC)
Most modern vehicles use dedicated short-range communication (DSRC) technologies to enable reliable and very high data transmission between vehicle-based devices and active safety applications...
Hacking an autonomous vehicle – Common attacks and vulnerabilities
Autonomous vehicles (AVs) incorporate several key technologies to enable driverless, safe, and efficient transportation. They use sensor technology and advanced driver assistance systems to...
Six emerging biometric technologies – Pros and cons
For thousands of years, we have been identifying our fellow human beings based on their voice, appearance, or gait. However, a scientific and systematic...