Feb 22, 2017

The DDoS (Distributed Denial-of-Service) occurrences are in everyone’s mind! Over the last few years, there has been an increase both in terms of number of attacks and scale of the attacks. Typically, a DDoS attacks consists in overwhelming a server by a number of requests it cannot handle. To complete a DDoS attack, hackers use relays: they take control of easy targets and use these targets to trigger the attack on the server itself.

Jan 31, 2017

According to the Identity Theft Resource Center, 900 major data breaches were recorded worldwide in 2016, up from 783 in 2014. In the hyper connected world, this is not really a surprise!

Jan 20, 2017

LoRa (Long Range Radio Wide Area Network), Sigfox, NB-IoT, LTE-M, … are acronyms that come often in exchanges about IoT projects. Other networks such as Wi-Fi, Bluetooth or Zigbee are also used for IoT projects, along with traditional mobile communication networks, GPRS, 3G, 4G and soon 5G.

<< <
Page 3 of 3
 > >>

About this blog…

 

Trusted Objects team members have a long experience in the smart security industry, and are reacting to industry trends & news.