Software developers working within the automotive industry are pessimistic about their ability to secure connected cars. A lack of support from employers is a big reason why, according to a Ponemon Institute survey. In-brief: Software developers working within the automotive industry are pessimistic about their ability to secure connected cars, a Ponemon Institute survey reveals.
Search Results for "right to repair"
Say ‘technology monoculture’ and most people (who don’t look at you cross-eyed or say ‘God bless you!’) will say “Microsoft” or “Windows” or “Microsoft Windows.” That makes sense. Windows still runs on more than 90% of all desktop systems, long after Redmond’s star is rumored to have dimmed next to that of Apple. Microsoft is the poster child for the dangers and benefits of a monoculture. Hardware makers and application developers have a single platform to write to – consumers have confidence that the software and hardware they buy will “just work” so long as they’re running some version of Windows. The downside, of course, is that the Windows monoculture has also been a boon to bad guys, who can tailor exploits to one operating system or associated application (Office, Internet Explorer) and be confident that 9 of 10 systems their malicious software encounters will at least be running some version of the […]
We’re still in the early days of the fast-emerging Internet of Things, but we can already identify some areas where inexpensive, remote sensors and other IP-enabled stuff will be transformative. Entertainment is one – and we’re already seeing the emergence of “smart TVs” that upset traditional boundaries between personal computing devices and viewing devices. Another market that’s being shaken is the one for home security systems. Anyone who has visited an electronics store or discount warehouse has seen packages of inexpensive, wi-fi enabled cameras that can be used to monitor the goings-on in and about your home “Scarface style.” Those DIY systems pose a threat to firms like ADT, GE and Tyco, which have been selling home security systems and monitoring services for decades. But you’re really setting the “paranoia” bar pretty high if you want to ask someone to install all those cameras, wire them up and then monitor […]
A security researcher claims to have uncovered a flaw in the Android security model that leaves almost all devices running the mobile operating system vulnerable to attacks and malicious software. Jeff Forristal, the Chief Technology Officer at Bluebox Security posted a description of the flaw on Wednesday. It affects Android devices running any version of the OS released in the past four years, starting with Version 1.6 (codename: “Donut” ) – a population of nearly 900 million devices. Discrepancies in how Android applications are cryptographically signed and then verified by Android allow a malicious attacker to modify the application package file (or APK) code without breaking the cryptographic signature. The implications of the flaw are huge. A malicious application installed on a vulnerable Android device could access any data stored on the device. For applications, such as mobile virtual private network (VPN), an attacker who could alter the application’s code or […]
Microsoft issued an emergency fix for its Internet Explorer web browser on Monday, just days after security researchers reported finding a previously unknown (zero day) vulnerability in IE that was being used in targeted attacks against members of Washington D.C.’s media, government and policy elite. Microsoft’s Security Response Center (MSRC) released the fix for IE versions 6, 7 and 8 on Monday following reports of sophisticated and targeted attacks using the vulnerability were detected on the web site of the Council of Foreign Relations, a leading think tank whose members include senior government officials. In a Security Advisory (#2794220), Microsoft described the flaw as a “remote code execution vulnerability” in code that governs the way that “Internet Explorer accesses an object in memory that has been deleted or (improperly) allocated.” The vulnerability could allow a malicious attacker to create a malicious web page that would exploit the vulnerability to corrupt memory in […]