Adding a Safety Lock to Children’s Smartwatches

Adding a Safety Lock to Children's Smartwatches

Real-time positioning, video calls, community interaction… Children’s smartwatches have become essential smart hardware for kids due to their rich and powerful features. However, due to the special nature of child users, the hidden concerns behind children’s smartwatches have also attracted widespread attention. The “Guidelines for the Protection of Personal Information and Rights of Children Using … Read more

The Increasing Smartphone-Like Features of Children’s Smartwatches

With dual cameras for taking photos and videos, the ability to post updates on social media, add friends to share short videos, and play games… so many features can be realized on a children’s smartwatch that has only one button. Since most smartwatches come with an open system, in addition to basic functions like communication … Read more

Industrial Internet Pilot Demonstration · Case Study | Issue 4: Innovative Practices in Network Security Protection for Industrial Control Systems by Luan Technology

Industrial Internet Pilot Demonstration · Case Study | Issue 4: Innovative Practices in Network Security Protection for Industrial Control Systems by Luan Technology

Editor’s Note: To implement General Secretary Xi Jinping’s important instructions on new industrialization and promote the innovative development strategy of the industrial internet in Beijing, the Beijing Communications Administration has vigorously advanced the high-quality development of the industrial internet in Beijing through relevant activities. Under the guidance of the Ministry of Industry and Information Technology, … Read more

Industrial Control System Information Security Protection Guidelines

Industrial Control System Information Security Protection Guidelines

Notice on Issuing the “Industrial Control System Information Security Protection Guidelines” Ministry of Industry and Information Technology Document No. 338, 2016 In order to implement the “Guiding Opinions of the State Council on Deepening the Integration of Manufacturing and the Internet” (Guofa [2016] No. 28), and to ensure the information security of industrial control systems … Read more

Testing and Analysis Report of Whitelist Products for Industrial Control Systems

Testing and Analysis Report of Whitelist Products for Industrial Control Systems

Author | National Internet Emergency Center, Du Peng 1. Background and Current Situation As the degree of digitization and intelligence of industrial control systems continues to improve, the traditional closed and isolated industrial environment is being broken, and the network security risks it faces are becoming increasingly severe. On one hand, viruses in the traditional … Read more

Thoughts and Practices on Industrial Control System Vulnerability Management

Thoughts and Practices on Industrial Control System Vulnerability Management

1. Industrial Control Security Vulnerabilities Are a Type of Cybersecurity Vulnerability Currently, there is no exact definition of industrial control security vulnerabilities internationally or domestically, but there are relatively mature research results regarding the definition of cybersecurity vulnerabilities. For example, China’s national standard “Information Security Technology – Network Security Vulnerability Identification and Description Specification” (GB/T … Read more

Interpretation of Emergency Management Guidelines for Industrial Control System Information Security Events

Interpretation of Emergency Management Guidelines for Industrial Control System Information Security Events

To further implement the “Guiding Opinions of the State Council on Deepening the Integration of Manufacturing and the Internet”, and in accordance with the “Cybersecurity Law of the People’s Republic of China” and the “Emergency Response Law of the People’s Republic of China”, the Ministry of Industry and Information Technology recently issued the “Emergency Management … Read more

What Does Hacking Historical Databases in Industrial Control Systems Mean?

What Does Hacking Historical Databases in Industrial Control Systems Mean?

Researchers from the industrial cybersecurity company Claroty revealed on January 17 that their Team82 discovered five exploitable vulnerabilities (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, and CVE-2022-38469) in GE Digital’s Proficy Historian server, affecting multiple critical infrastructure sectors. Threat actors could exploit these vulnerabilities to access historical data, crash devices, or execute code remotely. These vulnerabilities impact GE … Read more

Overview of Information Security Software and Monitoring for Industrial Control Systems

Overview of Information Security Software and Monitoring for Industrial Control Systems

Abstract This article discusses the development of information security software and monitoring for industrial control systems, introduces the architecture of information security software and monitoring for industrial control systems, and provides a detailed analysis of information security software and monitoring across various layers including the field device layer, field control layer, process monitoring layer, manufacturing … Read more

Design of Security Protection Technology System for Industrial Control Systems

Introduction Industrial Control Systems (ICS) refer to the collection of personnel, hardware, policies, and software that affect the safety (Safety), information security (Security), and reliable operation of industrial production processes, including Distributed Control Systems (DCS), Supervisory Control and Data Acquisition (SCADA) systems, Programmable Logic Controllers (PLC), Remote Terminal Units (RTU), and relevant information systems such … Read more