What does it come to your mind when you hear talking about hackers? Probably your first thoughts focus on breaking passwords and damaging a webpage or a computer. Maybe you think about the idea of stealing bank details in order to make money. You are right, but it is not common to relate cyber-security to healthcare when, actually, it is one of the most important targets of hackers.
Control and safety systems take a central role in the safe operation of trains in European rail networks since a long time. In the early days, around 1900, the Safety of trains was ensured by the usage of mechanical interlockings. Since then, the interlocking systems have experienced a steady evolution, which resulted in the current electronic interlockings (ESTW).
This post has been written by Markus Heinrich (Technische Universität Darmstadt).
This post has been written by Manos Athanatos.
This post has been written by Vittorio Vallero and Barbara Lunel.
This post has been written by Sarang Kahvazadeh, PhD Researcher from Polytechnic University of Catalonia
(Barcelona, Spain), Apr. 26th
This post has been written by Dr. Kostas Lampropoulos from University of Patras, Greece
(Patras, Greece), Mar. 26th
This post has been written by Andrea Bartoli, Director of Innovation at Worldsensing.
(Barcelona, Spain), Feb. 28th
This post has been written by Joaquín Rodríguez, ICT Consultant at ATOS Research and Innovation (Cybersecurity Lab).
(Madrid, Spain), Jan. 26th
In this post, we introduce most common attack vectors in critical infrastructures (CIs) in a clear and understandably way.
This post was written by Ilias Spais , Senior IT Project Manager and researcher. AEGIS IT Research
(Athens, Greece), Dec. 18thDigital Forensics: the term
Generally, the definition of digital forensics is “…the application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data". 1