Teenager hacks car with homemade equipment

by Chris Bubinas • No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Read More »

BMW security flaw shows automotive hacking is real

by Jessica Jaclin • No Comments

BMW security flaw shows automotive hacking is real

BMW was forced to address a security flaw that left millions of its cars vulnerable to hackers. How can static code analysis help...

Read More »

GHOST busting

by Rod Cope • No Comments

GHOST busting

How proactive open source notifications keep you up-to-date and secure with timely information about the latest releases and security patches, such as the GHOST vulnerability...

Read More »

CES highlights the growing danger of automotive hacking

by Jessica Jaclin • No Comments

CES highlights the growing danger of automotive hacking

At the recent Consumer Electronics Show in Las Vegas, automotive manufacturers focused a lot of attention on the new, improved computers they will be installing in their cars in the coming years. This will make upcoming models far more...

Read More »

Automotive hacking now a reality

by Jessica Jaclin • No Comments

Automotive hacking now a reality

Recently, one or more criminals committed a string of hacking-based break-ins that targeted vehicles in the Montreal area...

Read More »

Security an increasingly important component of open source efforts

by Rod Cope • No Comments

Security an increasingly important component of open source efforts

The open source landscape is poised to become even more dangerous in the coming year, according to a recent Trend Micro report...

Read More »

Static Analysis

Teenager hacks car with homemade equipment

March 2, 2015, Chris Bubinas - No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Software Security

Two sides of the same coin: open source security

February 23, 2015, Rod Cope - No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

HPC’s value grows, but the right approach is key

January 28, 2015, Chris Bubinas - No Comments

HPC’s value grows, but the right approach is key

HPC has expanded into new markets, but best practices are essential for companies eager to utilize these resources. ...

Open Source

Two sides of the same coin: open source security

February 23, 2015, Rod Cope - No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally...

Embedded Software

We’re going to embedded world 2015!

February 10, 2015, Julia Smith - No Comments

We’re going to embedded world 2015!

See what we're bringing to embedded world Exhibition & Conference to help deliver safe, secure, and reliable code...

Analytics & Data Mining

Data mining for public health

January 16, 2015, Chris Bubinas - No Comments

Data mining for public health

As a number of recent developments have demonstrated, data mining technology can play a tremendous, powerful role in the public health sector...

Scroll to top