In-brief: The same wireless software that powers a consumer quadcopter is also under the hood of Tesla’s Model S, according to a leading security expert – underscoring the increasingly long and complex software supply chain for connected products.
news
Fed CIO’s Security Sprint Ends with Long To-Do List
In-brief: In a 21-page memorandum posted on the White House website, the Obama Administration identified its top cyber security priorities. Among them: identifying high value information and assets on government networks, responding to cyber incidents in a timely manner and finding and keeping qualified information security staff. Its a list that one leading security expert says sounds worryingly familiar to earlier federal nostrums.
Firm: Two iOS Exploits Could Qualify for $1 Million Bounty
In-brief: One team qualified for the $1 million bounty for a working, remote exploit or jailbreak for devices running Apples iOS 9 operating system, according to the security firm Zerodium. A second may also qualify for at least a partial bounty. However, Apple may only be informed of the holes at a later date.
Android Security Undermined by OEMs
In-brief: Google’s insistence on stricter security policies with its latest release of the Android mobile operating system are being watered down by the company’s partners, who are undermining stricter OS security with weak or insecure policies and device configuration, a new report from Aalto University in Finland finds.
Researchers Prove Connected Cars Can Be Tracked – IEEE Spectrum
In-brief: research from the University of Twente in The Netherlands suggests that vehicle-to-vehicle and vehicle-to-infrastructure communications may enable passive surveillance of a vehicle’s movements, raising privacy concerns.