The Myth of ARM Chip Security Shattered! Domestic Technology’s Lifeline Cut Off, How Much Longer Can We Endure?

The Myth of ARM Chip Security Shattered! Domestic Technology's Lifeline Cut Off, How Much Longer Can We Endure?

Have you ever thought that the mobile phones, computers, and even bank servers you use every day might be exposed to hackers? Just last month, Samsung and a South Korean university tore away the last veil of ARM chip security—the so-called “absolute security” memory protection mechanism was pierced like paper in their hands. Even more … Read more

China’s ‘Queen of Cryptography’ Wang Xiaoyun: A Legendary Scholar Who Broke America’s Top Encryption Algorithms to Safeguard National Cybersecurity

China's 'Queen of Cryptography' Wang Xiaoyun: A Legendary Scholar Who Broke America's Top Encryption Algorithms to Safeguard National Cybersecurity

She is known as the “Queen of Cryptography” in China and is a mathematical genius that gives headaches to American intelligence agencies. She led her team to successively crack globally recognized secure encryption algorithms such as MD5 and SHA-1, shocking the international cryptography community and forcing the U.S. National Institute of Standards and Technology (NIST) … Read more

Concern | Do You Think Smartwatches Make Children Safer? The Reality Might Be More Dangerous…

Concern | Do You Think Smartwatches Make Children Safer? The Reality Might Be More Dangerous...

Smartwatches that can monitor children’s safety are familiar to everyone. They integrate positioning, listening, and calling functions, allowing parents who cannot be with their children at all times to keep track of their status. Such products are quite popular in many countries; however, they have been banned in Germany. Why is that? △Video: Germany Bans … Read more

Risk Assessment of Ladder Diagrams: A Security Analysis Framework for Industrial Control Systems

Risk Assessment of Ladder Diagrams: A Security Analysis Framework for Industrial Control Systems

Click the blue text for more exciting information Once again, someone asked me about the safety of ladder diagrams, I really can’t believe it. Every time something goes wrong, they come to me only after the crisis has hit, if they had contacted me earlier, the workshop wouldn’t have had to stop production for three … Read more

Siemens SPPA-T3000 Control System Exposes Critical Vulnerabilities, Leaving Global Power Plants at Risk!

Siemens SPPA-T3000 Control System Exposes Critical Vulnerabilities, Leaving Global Power Plants at Risk!

Recently, Siemens announced that its industrial equipment, commonly used in petrochemical plants and large renewable energy power plants, has 54 security vulnerabilities. Among these, the most severe vulnerabilities can be exploited for denial-of-service (DoS) attacks or remote code execution on arbitrary servers, putting power plants at risk of failure and halting electricity generation. More alarmingly, … Read more

How Enterprises Can Understand the ‘Guidelines for Cybersecurity Protection of Industrial Control Systems’

How Enterprises Can Understand the 'Guidelines for Cybersecurity Protection of Industrial Control Systems'

With the rapid development of information technology, industrial control systems are increasingly exposed to the internet environment, facing unprecedented security challenges. To enhance awareness of industrial information security risk prevention, in 2024, the Ministry of Industry and Information Technology issued the ‘Guidelines for Cybersecurity Protection of Industrial Control Systems’ (hereinafter referred to as the ‘Protection … Read more

Industrial Control System Security: Five Layers of Protection Strategies Against PLC Network Attacks

Industrial Control System Security: Five Layers of Protection Strategies Against PLC Network Attacks

Hello engineers and security experts! Today, let’s discuss the “ever-relevant” topic of industrial control system security, especially regarding PLCs, the “brain” of industrial control systems. If hackers target them, it could lead to significant trouble! Imagine a PLC as the “conductor” of a factory, controlling every aspect of the production line. If hackers gain control … Read more

Advancements in Sensor Attack Techniques in OT Networks: A Deep Dive

Advancements in Sensor Attack Techniques in OT Networks: A Deep Dive

Editor’s NoteThe Russia-Ukraine war has accelerated the innovation of tactics and techniques for cyber attacks on industrial control systems. The bombing incident involving pagers and walkie-talkies in the Lebanon conflict has reshaped the understanding of traditional cyber warfare. Artificial intelligence and large models have reduced the spatiotemporal costs for attackers. Targeted ICS malware, weaponized PLCs, … Read more

The Security Weakness of Smart Buildings: KNX and Zigbee Networks

The Security Weakness of Smart Buildings: KNX and Zigbee Networks

For more global cybersecurity news, visit E-Security’s official website at www.easyaq.com E-Security reports on April 1st that people are increasingly living and working in “smart” buildings, relying on automated processes to control heating, ventilation, air conditioning, lighting, security, and other operational systems. Are these systems capable of withstanding cyber attack threats? A research team from … Read more

Severe Vulnerability Found in Wi-Fi Encryption System, 50% of Android Systems Particularly Vulnerable

Severe Vulnerability Found in Wi-Fi Encryption System, 50% of Android Systems Particularly Vulnerable

Annual subscribers can join the Technology English Learning Community, with weekly live classes on technology English. For details, see “Read the original text”. This Monday, a paper published by researchers Mathy Vanhoef and Frank Piessens from KU Leuven in Belgium regarding a security vulnerability in WPA2 (Wi-Fi Protected Access II) caused a seismic shock in … Read more