In-brief: The same wireless software that powers a consumer quadcopter is also under the hood of Tesla’s Model S, according to a leading security expert – underscoring the increasingly long and complex software supply chain for connected products.
Tag: vulnerabilities
Fed CIO’s Security Sprint Ends with Long To-Do List
In-brief: In a 21-page memorandum posted on the White House website, the Obama Administration identified its top cyber security priorities. Among them: identifying high value information and assets on government networks, responding to cyber incidents in a timely manner and finding and keeping qualified information security staff. Its a list that one leading security expert says sounds worryingly familiar to earlier federal nostrums.
Firm: Two iOS Exploits Could Qualify for $1 Million Bounty
In-brief: One team qualified for the $1 million bounty for a working, remote exploit or jailbreak for devices running Apples iOS 9 operating system, according to the security firm Zerodium. A second may also qualify for at least a partial bounty. However, Apple may only be informed of the holes at a later date.
Security Holes in Power Analyzers More Bad News for Industry
In-brief: Software security holes in widely used industrial equipment known as “power quality analysers” (sp) could enable remote attackers to disrupt or corrupt operations at firms across industries, according to a report released by the firm Applied Risk.
Android Security Undermined by OEMs
In-brief: Google’s insistence on stricter security policies with its latest release of the Android mobile operating system are being watered down by the company’s partners, who are undermining stricter OS security with weak or insecure policies and device configuration, a new report from Aalto University in Finland finds.