Unique Cybersecurity Challenges Faced by ECCs

This session provided a compelling look at current trends in cyber security threats and requirements ECCs need to consider in mitigating their exposure to cyber security threats.

Cell Phone Are Listening – And So Are the Hackers

Like most other technology, cell phones are vulnerable to cyberattacks.  Cell phones are susceptible to several different types of attacks, including the threats that were discussed during this presentation.

Cybersecurity Vulnerabilities Discovered in Police Radios

Three Dutch security analysts discovered five vulnerabilities in a police radio standard called Terrestrial Trunked Radio (TETRA) developed by the European Telecommunications Standard Institute (ETSI). This standard has been used since the 1990s and is used globally by law enforcement, militaries, critical infrastructures, and industrial control systems (ICS). These newly discovered TETRA vulnerabilities allow for […]