Linkedin Mail Telegram Twitter WordPress Youtube
  • Home
  • My articles
    • Cyber-Kinetic Security
    • 5G and Massive IoT (mIoT)
    • Society 5.0
    • Cybersecurity and Cyber Risk Management
    • Telecommunications
  • My Books
    • The Future of Leadership in the Age of AI
    • Securing Society 5.0
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Search
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Cyber Kinetic - Marin Ivezic Cyber-Kinetic Security, IoT Security, CPSSEC by Marin Ivezic
  • Home
  • My articles
    • Cyber-Kinetic Security
    • 5G and Massive IoT (mIoT)
    • Society 5.0
    • Cybersecurity and Cyber Risk Management
    • Telecommunications
  • My Books
    • The Future of Leadership in the Age of AI
    • Securing Society 5.0
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Home Research - Tests Show Vulnerabilities of Superyachts

    Research – Tests Show Vulnerabilities of Superyachts

    By
    Marin Ivezic
    -
    November 19, 2017
    Superyachts Cyber-Kinetic

    Researcher Campbell Murray demonstrated the ease with which superyacht navigation, communication and Wi-Fi systems could be controlled remotely by hackers.

    Superyachts Cyber-Kinetic
    Previous articleResearch – Tests Show Vulnerabilities of Industrial Robots
    Next articleResearch – Test Demonstrates Vulnerabilities of a Commercial Aircraft
    Marin Ivezic
    • Home
    • My articles
      • Cyber-Kinetic Security
      • 5G and Massive IoT (mIoT)
      • Society 5.0
      • Cybersecurity and Cyber Risk Management
      • Telecommunications
    • My Books
      • The Future of Leadership in the Age of AI
      • Securing Society 5.0
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • Contact
    © Marin Ivezic All rights reserved | Terms of Use | Privacy Policy