BUSINESS > Services > Transport & Travel


« Back to News

2016-09-06

Keyless Entry Renders Millions Of Cars Vulnerable

Tens of millions of cars are made vulnerable to theft by their keyless entry systems, according to a report by computer security experts.

2016-08-26

Solutions To Automotive Cyber Hacking Risks

Hacking is now one of the auto industry’s biggest concerns, especially as modern cars add more electronic controls and infotainment systems.

2016-08-24

Made in Britain: Facebook's Drones

In a warehouse in Somerset UK, the latest phase in Facebook's bid for world domination has been taking shape.

2016-08-11

Deep Mystery: Looking For MH370

Researchers hunting for the lost Malaysia Airlines MH370 now believe the plane glided down & they have been searching the wrong patch of ocean.

2016-08-11

The Race To Regulate Self-Driving Cars

Unintended consequences of the the “internet of things” include incomplete & inconsistent laws which depress the benefits without addressing the risks.

2016-08-19

New Airport Security Technology

Threats from terrorism & international crime are prompting a big effort by civil aviation to develop new screening technologies.

2016-07-26

US Carmakers Want Hackers To Help Them Improve Cybesecurity

Today's automobile is rapidly becoming a computer on wheels, with more micro-processing power than can be found in a typical home or office.

2016-07-12

BMW, Intel and Mobileye Developing Self-Driving Cars

Car manufacturer joins forces with US computer chip giant and Israeli technology firm to bring fully automated driving into production by 2021.

2016-07-12

Four Threats To Aviation Security – and Four Responses

From terrorist attacks to geopolitical posturing, aviation is reaching the frontline of global security & cyber risks. Opinion by Anja Kaspersen.

2016-07-08

Tesla Test Driver Dies On Autopilot

A Tesla test driver was killed in the first known fatal crash involving a self-driving car. He was watching a film at the time of collision.

2016-06-29

New US Biometric Passport Regulations Will Prevent Entry To Millions

The US government has quietly introduced requirements for all travelers to hold electronic biometric passports to enter the country.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.