Smart Home Devices Turn into ‘Life Spies’: How to Evict the ‘Invisible Guests’?

Smart Home Devices Turn into 'Life Spies': How to Evict the 'Invisible Guests'?

The smart vacuum cleaner in your home works right under your nose, while the ‘invisible guest’ watches you through its built-in camera… Recently, a smart vacuum cleaner from a South Korean brand was reported to have security vulnerabilities, allowing hackers to remotely control it and invade personal privacy.Click the audio to learn more! Originally intended … Read more

Latest Trends in Automation: Cybersecurity Mindset Required in the Era of Industrial Internet of Things (IIoT)

Latest Trends in Automation: Cybersecurity Mindset Required in the Era of Industrial Internet of Things (IIoT)

This article is from the September 2016 issue of CONTROL ENGINEERING China, originally titled: Cybersecurity Mindset Required in the Era of IIoT As the application of the Industrial Internet of Things (IIoT) increases, the potential risks of cyber attacks are also on the rise. To prevent these risks from becoming a reality, manufacturing companies need … Read more

Implementation Plan and Best Practices for Level Protection in Siemens PLC Industrial Control Systems

Implementation Plan and Best Practices for Level Protection in Siemens PLC Industrial Control Systems

The security of industrial automation systems is a key focus in the modern industrial control field, especially for industrial control systems involving Siemens PLCs. How to implement level protection (referred to as “level protection”) has become an unavoidable topic for engineers.This article will interpret how to implement level protection requirements in Siemens PLC systems from … Read more

wolfSSL: A Lightweight Security Choice, An SSL/TLS Framework Designed for Embedded Environments

wolfSSL: A Lightweight Security Choice, An SSL/TLS Framework Designed for Embedded Environments

In the context of increasingly severe cybersecurity threats, how to protect the communication security of embedded devices, mobile applications, and even enterprise systems has become a pressing issue for developers. wolfSSL, as an efficient, lightweight, and industry-standard compliant SSL/TLS library, has gradually become the preferred choice for security in embedded and resource-constrained environments due to … Read more

Case Study: Construction Project of “5G + Smart Mine” Industrial Control System for Coal Enterprises

Case Study: Construction Project of "5G + Smart Mine" Industrial Control System for Coal Enterprises

Coal mining has evolved from blasting and mechanized mining to intelligent mining. With advancements in technology, the Internet of Things, big data, cloud computing, 5G, and artificial intelligence have become key focal points in a new round of technological revolution and industrial upgrade. The adoption of next-generation intelligent technologies to transform traditional coal mining production … Read more

A Decade of Vigilance: Safeguarding Industrial Control System Security Against the Resurgence of Stuxnet

A Decade of Vigilance: Safeguarding Industrial Control System Security Against the Resurgence of Stuxnet

【Introduction】Today marks the tenth anniversary of the “Stuxnet” virus.Since its first attack in 2009, this virus, known as a “super destructive weapon,” has been in a decade-long game of cat and mouse with global industrial control systems.If we consider a decade as a cycle, then in this era where “cyber warfare” could erupt at any … Read more

Five Key Lessons from Attacks on Industrial Control Systems

Five Key Lessons from Attacks on Industrial Control Systems

Attacks on Industrial Control Systems are becoming increasingly frequent, yet they lack novelty. Imagine it is 1903, and you are standing in front of a large inn on a remote peninsula in Poldhu, Cornwall, England. Despite the large antenna next to the inn and a large kite occasionally lifting the antenna higher, you might not … Read more

The Basic Framework for Designing Dynamic Encryption Algorithms with Malbolge

The Basic Framework for Designing Dynamic Encryption Algorithms with Malbolge

Malbolge: A programming language from “hell” that can actually be used for encryption? What is Malbolge? Do you really want to know? If programming languages have a “ceiling of complexity”, then Malbolge is definitely the champion. This language has never had a truly functional program written by its creator, Ben Olmstead! Yes, you heard it … Read more

Expert Insights on the Current Situation and Protective Strategies for Industrial Control System Cybersecurity

Expert Insights on the Current Situation and Protective Strategies for Industrial Control System Cybersecurity

★ Yang Xuezhi, Xiao Wei, Zhao Yangguang, China Software Testing Center Abstract:Industrial control systems are a crucial foundation for the digital transformation of manufacturing and a significant driving force for new industrialization. In recent years, with the rapid development of computer technology, communication technology, and control technology, the traditional control field is undergoing an unprecedented … Read more