mobile
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,paged,tag,tag-mobile,tag-264,paged-4,tag-paged-4,wp-theme-stockholm,wp-child-theme-hojtcom,stockholm-core-2.4.9,select-child-theme-ver-1.0.0,select-theme-ver-9.14.4,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.7.2,vc_responsive

Report: Ambulances vulnerable to hackers

Using widely available scanning software, a security researcher in Spain recently found several thousand industrial vehicles, including ambulances, with unsecured communications hubs. Sourced through Scoop.it from: medcitynews.com Hackable ambulances is just another symptom of hackable healthcare. Connecting devices, vehicles, etc is not only about using the

Vulnerable Surfaces: Hacking of Cars & Healthcare

The Nissan Leaf can be hacked through its mobile app. Our hospitals have many more vulnerable surfaces - a recent ISE report identifies solutions. Sourced through Scoop.it from: blog.check-and-secure.com Many MedTech suppliers don’t seem to care about security since their equipment is "protected by the hospitals

Car Industry Three Years Behind Today’s Cyber Threats

Researchers say when it comes to car hacking it's going to take three years for automakers to catch up with the number cyber threats targeting cars. Sourced through Scoop.it from: threatpost.com The automotive industry have to realize that they are now in the mobile and software

A mobile data breach could cost you $26.4 million – Help Net Security

Mobile While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the fi Sourced through Scoop.it from: www.helpnetsecurity.com Mobile access of company data is a bigger risk than IT and Security departments

Acecard Android Trojan Raises Serious Concerns

The re-emergence of the mobile banking Trojan known as Acecard, which is now threatening a broader range of targets worldwide, highlights the growing risks Sourced through Scoop.it from: www.databreachtoday.com User susceptibility to social engineering, insecure authentication, weak security in application design and development, and inadequate app

Loading new posts...
No more posts
Hojt Digital
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.