Trending Cyber-Kinetic Security & Cybersecurity Posts

    All Cyber-Kinetic Security & Cybersecurity Posts

    • 5G Security5G Connectivity Security

      5G Network: A Quantum Leap in Connectivity – and Cyber Threats

      The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th…

      Read More »
    • 5G SecurityNFC Cybersecurity

      NFC Security 101 (Non-5G IoT Connectivity Options)

      NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available modes of NFC communication: Read/write (e.g. for reading tags in NFC posters) Card emulation (e.g. for making payments) Peer-to-peer (e.g. for file transfers) There is no need for…

      Read More »
    • 5G SecurityRFID Cybersecurity

      RFID Security 101 (Non-5G IoT Connectivity Options)

      Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the latest biometric passports.  It operates in several frequency bands like Low frequency band from 125 kHz to 134 kHz, High frequency band with 13.56MHz working frequency, Ultra-high frequency band with 433 MHz working frequency and 860…

      Read More »
    • 5G SecurityWi-Fi Cybersecurity

      Wi-Fi Security 101 (Non-5G IoT Connectivity Options)

      The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within 50m range, it operates in 2.4 GHz and 5GHz frequency bands,. This technology was developed for wireless networking of computer devices and is commonly called WLAN (Wireless Local Area Network), where the communication is realized between wireless routers typically connected…

      Read More »
    • 5G SecurityBluetooth Cybersecurity

      Bluetooth Security 101 (Non-5G IoT Connectivity Options)

      Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many other technologies. Bluetooth is the optimal solution for establishing small wireless networks called Piconets, by connecting two Bluetooth devices. One of these nodes is Master that can be connected via Bluetooth link to 7 other Bluetooth…

      Read More »
    • 5G SecurityZigbee Security

      Zigbee Security 101 (Non-5G IoT Connectivity Options)

      Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard determines specifications for the physical and data link layer and Zigbee Alliance provides standards from network layer to application layer. While Zigbee determines the contents…

      Read More »
    • 5G SecurityLoRaWAN IoT Security

      LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

      I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high bandwidth, network slicing and ubiquitous coverage becoming the foundational capability for mission critical industrial, agricultural, financial,…

      Read More »
    • 5G Security5G Critical Infrastructure

      5G Critical Infrastructure – the Most Critical of All

      Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities…

      Read More »