When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the...
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in...
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind....
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment...
Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of...
Getting smart about security in smart systems
Smart used to be something we called people or pets. It wasn't a term one would use to...
In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from...
Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the...
In one of those strange inversions of reason, The Internet of Things (IoT) arguably began before the Internet itself. In 1980, a thirsty graduate...
More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than...
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the...
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through...
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure...
Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are rapidly being connected to the internet, affording attackers opportunities...
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the...