At the recent Consumer Electronics Show in Las Vegas, automotive manufacturers focused a lot of attention on the new, improved computers they will be installing in their cars in the coming years. This will make upcoming models far more vulnerable to potential hackers, putting car owners in serious dangerRead More »
As a number of recent developments have demonstrated, data mining technology can play a tremendous, powerful role in the public health sectorRead More »
Even as the Internet of Things is expected to see rapid growth in the next few years, the security threats associated with more connected devices are growing as well. And the challenges for developers of embedded software in such devices are myriadRead More »
Some SD cards contain embedded software vulnerabilities that enable arbitrary code execution on the cardRead More »
Over the past few years, concerns have been raised at various times about the security of embedded software in medical devices such as insulin pumps, pacemakers and even Fitbit fitness monitorsRead More »
Sony released its highly anticipated Playstation 4 console at midnight on Nov. 15, and, while substantial reports of errors have not emerged, an immediate firmware update required by the console did prompt some confusion and high-flying accusationsRead More »
A backdoor in the firmware of certain D-Link routers could allow an attacker to access and change the device's settings or to execute arbitrary codeRead More »
With more devices and sensors being connected to the Internet, the potential for hackers to disrupt life in unexpected ways is rapidly evolving. So far, however, most discussions of the threat have focused either on household devices or on control systems tied to critical infrastructureRead More »
Greetings, Recently, I was reading a newspaper article about how insurance companies are using “telematics” to adjust your premiums when it occurred to me just how powerful automotive tracking technology has become. The article I read described how insurance companies are able to monitor your driving habits to determine how safe of a driver you are and then charge you accordingly. The newspaper article doesn’t go into too much detail on what information is collected or how it is managed or manipulated in order to determine the final bill. It does, however, mention “Big Data”Read More »
As cars come to increasingly resemble moving computers, with millions of lines of code governing their systems, fears about the possibility of automotive terrorism have expanded among some in the industry and its regulating bodies. At the same time, others have dismissed the likelihood of such attacks, labeling them as "fear-mongering."Read More »
At the recent Consumer Electronics Show in Las Vegas, automotive manufacturers focused a lot of attention on the new, improved computers they will be installing in their...
With the right practices and the right tools - such as open source scanning and governance applications - organization leaders will be able to leverage open source more...
As a number of recent developments have demonstrated, data mining technology can play a tremendous, powerful role in the public health sector...