A backdoor in the firmware of certain D-Link routers could allow an attacker to access and change the device's settings or to execute arbitrary codeRead More »
In addition to conventional radar, today's ships use technology known as automated identification systems to track their movements, improving oversight, navigation, safety and, critically, collision avoidanceRead More »
With more devices and sensors being connected to the Internet, the potential for hackers to disrupt life in unexpected ways is rapidly evolving. So far, however, most discussions of the threat have focused either on household devices or on control systems tied to critical infrastructureRead More »
Greetings, Recently, I was reading a newspaper article about how insurance companies are using “telematics” to adjust your premiums when it occurred to me just how powerful automotive tracking technology has become. The article I read described how insurance companies are able to monitor your driving habits to determine how safe of a driver you are and then charge you accordingly. The newspaper article doesn’t go into too much detail on what information is collected or how it is managed or manipulated in order to determine the final bill. It does, however, mention “Big Data”Read More »
As cars come to increasingly resemble moving computers, with millions of lines of code governing their systems, fears about the possibility of automotive terrorism have expanded among some in the industry and its regulating bodies. At the same time, others have dismissed the likelihood of such attacks, labeling them as "fear-mongering."Read More »
The Department of Homeland Security recently released an advisory to manufacturers and healthcare organizations warning of security vulnerabilities in the firmware of approximately 300 different medical devices from around 40 vendorsRead More »
In response to mounting concerns and intensifying threats, the U.S. Food and Drug Administration recently released an advisory notice addressing cybersecurity for medical devices and hospital networks. By taking steps to secure devices and healthcare facilities at the software development and network security levels, those in the industry can reduce the risk of harmful attacksRead More »
Following an investigation of a 2007 Jeep Grand Cherokee that shifted to neutral and began rolling away during a remote start, Chrysler has uncovered an electrical flaw affecting nearly 300,000 Jeeps. The company recently issued a voluntary safety recall to update the embedded software in the final drive controller on affected vehiclesRead More »
A German researcher claimed to have discovered security vulnerabilities in aircraft communication technologies, but aviation industry experts have dismissed the idea. This latest report is not the first time that avionics technology has been called into question, however, prompting discussions about the software security of these systemsRead More »
As battery-powered cars become more prevalent, the grid of charging stations is also growing to support them. However, these stations are poorly secured and require new development approaches to avoid a major infrastructure risk, according to security researcher Ofer ShezafRead More »
The cloud-init package is one of my favorite tools for tweaking the settings within a cloud instance. What you may not know is that you can use cloud-init to change the...
Part 2 of two-part walk-through of a migration from RHEL to CentOS, comparing the two alternatives...
Let’s look at the new features and improvements in TotalView for HPC and CodeDynamics 2017.3. See how they’ll help your development group quickly diagnose and fix...
© 2017 Rogue Wave Software, Inc. All rights reserved.
Rogue Wave is a registered trademark of Rogue Wave Software, Inc. Other product and service names may be trademarks of Rogue Wave Software, Inc. or its affiliates.