The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 29 janvier 2016
Christmas and New-year’s holidays are always a good occasion to give and receive trendy and modern gifts. Maybe this year, you have received a useful smart object, or a useless one from this list (http://www.internetofuselessthings.io), that have made you happy? But your happiness might be ruined by what follows…
Experts agree that all smart objects are now hackable! Almost all of them have now a connecting version, the problem being that nearly all of them suffer from a conception weakness in terms of security.
On the Internet of things (IoT) ground, we are dealing with security levels information systems had 20 years ago, i.e. a level close to zero!
It’s thus the moment to think about how dangerous the objects given or received on Christmas Eve are…
Some of these objects have made it to the headlines, which allows to draw a top 8 hackable objects based on their notoriety:
– Cars: The most interesting example was the hacking of a Jeep (http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway ),
– Smart sniper rifle which has WIFI aim assist (http://www.wired.com/2015/07/hackers-can-disable-sniper-rifleor-change-target ),
– Smart bathroom scales,
– Mini drones (certainly one of the big hits for 2014 and 2015 gifts),
– Baby monitors (babyphone, etc.),
– Smart fridges (which have leaked owners’ Gmail addresses),
– Security cameras, of course,
– Smart padlocks, which link to digital locks in hotels…
Among those that are rarely gifted at Christmas (J), we can mention SCADA industrial control systems: by attacking Iranian centrifuges in 2010, Stuxnet (Supervisory Control And Data Acquisition) has entered the global hacking history, but problems have also occurred inside dams in the USA…
“last but not least”, connected toilets that change your life: http://bgr.com/2014/06/12/smart-home-toilets-hacked.
In 1964, Disney studios created a great movie called “Mary Popins”. One would remember the scene when objects went completely mad after the kids have released and lost control of Mary Popins magic… Technology advances shouldn’t drive us towards a world where control loss over objects would make our lives hell…
Cet article vous a plu ? N'hésitez pas à le partager