Predicting conflict over water shortages

Can analytics really predict water wars?

Read more

You want another network to manage?

LoRa and Sigfox gain share but NB-IoT will win in the end.

Read more

Water crisis hits industry in Mangalore

The media underplay the impact of a water crisis on industry.

Read more

Pegasus used to hack WhatsApp

Hackers have installed surveillance software on mobile phones using Pegasus, exploiting a vulnerability in WhatsApp.

Read more

Cyber secure

The power blackout in Venezuela has caused widespread disruption. Including to the water supply. Tap water was said to have turned black. Dramatic pictures showed citizens going to extraordinary lengths to get water.

Read more

Russians hack control rooms

The Wall Street Journal reports that Russian hacking group Dragonfly APT has accessed utilities’ control rooms.

Read more

Water Security

When you hear that there has been a meeting of the Ministerial Council for National Security in Iraq chaired by Prime Minister Haider Al-Abadi, you would be forgiven if you didn’t guess it was about water.

Read more

Russian Government Cyber Activity Targets Water

i2O has sought to be a leader in information security. Why? Because we provide services to an industry that is responsible for critical national infrastructure. It seems that we were right to do so.

Read more

Cyberfine for water companies

The UK Government has announced that critical national infrastructure companies will face fines of up to £17m if they fail to protect themselves from cyber-attacks, effective May 2018. Critical national infrastructure companies include energy, transport, health and water companies. They are being told that they should have in place ‘the most robust safeguards.’ The National […]

Read more

The S in SCADA isn’t for Secure

The S in SCADA stands for Supervisory, not Secure. An article in the Harvard Business Review entitled ‘Smart Cities Are Going to Be a Security Nightmare‘ points out that SCADA systems are particularly susceptible to frequent hacks due to poor security protocols, and a lack of cryptographic security and authentication factors. This is largely because […]

Read more