The Null Session
  • Home
  • Bio
  • Activities
  • Schedule
  • Publications & Presentations
  • Affiliations
  • Privacy
  • Contact

Category: IoT, IIoT, ICS-SCADA

Explosion of smart devices put homes at risk

Apr
01
2019
April 1st, 2019 by John

Posted in IoT, IIoT, ICS-SCADA

7 Malware Families Ready to Ruin Your IoT’s Day

Apr
01
2019
April 1st, 2019 by John

Posted in IoT, IIoT, ICS-SCADA, Malware, PUPs and Botnets

Digital Threats Against Water Utilities

Apr
01
2019
April 1st, 2019 by John

Posted in Exploits & Attacks, IoT, IIoT, ICS-SCADA

Cyber Attack Puts a Spotlight on Fragile Global Supply Chain

Mar
20
2019
March 20th, 2019 by John

Posted in Exploits & Attacks, IoT, IIoT, ICS-SCADA, Supply Chain

Securing the Industrial Supply Chain

Mar
20
2019
March 20th, 2019 by John

Posted in Cybersecurity & Infosec, IoT, IIoT, ICS-SCADA, Supply Chain

An Introduction to Building Management System Vulnerabilities

Mar
20
2019
March 20th, 2019 by John

Posted in IoT, IIoT, ICS-SCADA, Vulnerabilities

Protecting Critical Infrastructure from Cyber Warfare

Mar
14
2019
March 14th, 2019 by John

Posted in IoT, IIoT, ICS-SCADA, Nation State, War & Terrorism

Making Smart Cities Effective

Mar
14
2019
March 14th, 2019 by John

Posted in IoT, IIoT, ICS-SCADA, Smart Cities

← Previous Article
Next Articles »

The Null Session

Search

Social

  • linkedin
  • twitter
  • facebook
  • flickr
  • instagram
  • mail

Twitter Posts

Dr. John D. Johnson Follow

Champion of Science. Invoker of Logic. Promoter of Reason. Educator. Speaker. Volunteer. Community Builder. Cybersecurity/CXO/Founder.

johndjohnson
johndjohnson Dr. John D. Johnson @johndjohnson ·
20h

5 BCDR Essentials for Effective Ransomware Defense

Reply on Twitter 1923063854499607010 Retweet on Twitter 1923063854499607010 Like on Twitter 1923063854499607010 X 1923063854499607010
johndjohnson Dr. John D. Johnson @johndjohnson ·
21h

The Kids Online Safety Act is back, with the potential to change the Internet

As it currently stands, KOSA would be able to hold social media platforms legally accountable if it’s proven that these companies aren’t doing enough to protect minors from harm. The bill includes a…

Reply on Twitter 1923048504659767628 Retweet on Twitter 1923048504659767628 Like on Twitter 1923048504659767628 X 1923048504659767628
johndjohnson Dr. John D. Johnson @johndjohnson ·
14 May

A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors.…

Reply on Twitter 1922701462427041962 Retweet on Twitter 1922701462427041962 Like on Twitter 1922701462427041962 X 1922701462427041962
johndjohnson Dr. John D. Johnson @johndjohnson ·
14 May

Welcome to the age of paranoia as deepfakes and scams abound

On LinkedIn, it can be hard to distinguish a slightly touched-up headshot of a real person from a too-polished, AI-generated facsimile. Deepfake videos are getting so good that longtime email scammers are pivoting to…

Reply on Twitter 1922686111924559943 Retweet on Twitter 1922686111924559943 Like on Twitter 1922686111924559943 X 1922686111924559943
Load More

Archives

Recent Comments

  • Biggles on Why Should I Use 2-Factor Authentication?
  • Okashii Budo on Please, Put Down The Mustard…
  • Nullsession on QCESC Awards Ceremony
  • Nullsession on QCESC Awards Ceremony

© The Null Session 2025

The Null Session

The intersection of cybersecurity, risk, privacy, science & society

built with Social Magazine and WordPress