Software Integrity Blog

Author Archive

Robert Vamosi

robertvamosi


Posts by Robert Vamosi:

 

WannaCry ransomware attack takes the world by storm

On Friday, several organizations around the world fell victim to a wave of ransomware that swept the globe. Ransomware is malware that encrypts the hard drives of compromised machines until the owner makes full payment. Such attacks have been persistent but relatively quiet. Until now, ransomware had been confined to limited or one-off events. A […]

Continue Reading...

Posted in General | Comments Off on WannaCry ransomware attack takes the world by storm

 

DoublePulsar continues to expose older Windows boxes: What you need to know

A hacking tool leaked in April by a mysterious organization is attacking older Windows boxes, exposing gaps in organizational update and upgrade policies. One researcher estimates that between 100K and 200K boxes may already be compromised worldwide. What’s particularly interesting is that Microsoft issued a patch for the underlying vulnerabilities in March. Shadow Brokers Several […]

Continue Reading...

Posted in Data Breach, Software Architecture and Design | Comments Off on DoublePulsar continues to expose older Windows boxes: What you need to know

 

Dan Geer explores the DevOps ‘Law of the Jungle’ dilemma

Faced with the constant threat of cyber attack, software security is evolving at an unprecedented rate. DevOps must ask itself, What’s more likely to lead to long-term survival: investing in better cyber security or reducing the number of software components it must struggle to secure? As humans have evolved over time, so has cyber security, […]

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on Dan Geer explores the DevOps ‘Law of the Jungle’ dilemma

 

Hajime and Mirai locked in an IoT botnet turf war

Last fall, someone released a benign worm looking to protect Internet of Things (IoT) devices from more dangerous worms. Known as Hajime, the vigilante malware appears to be designed to block another IoT worm, Mirai. The two are chasing each other around the world. Each are locked in a weird internet turf war seemingly bent on […]

Continue Reading...

Posted in Internet of Things | Comments Off on Hajime and Mirai locked in an IoT botnet turf war

 

Sirens in the night: Civil defense systems susceptible to legacy vulnerabilities

Legacy vulnerabilities are often old “features” that weren’t designed for modern use. Since every new day brings a new attack, it’s time to secure them.

Continue Reading...

Posted in Critical Infrastructure Security, Software Architecture and Design | Comments Off on Sirens in the night: Civil defense systems susceptible to legacy vulnerabilities

 

Secure automotive software at any speed

The features that drive new car sales today are increasingly based on software. Drivers want their own music. They want to stay connected with their digital world. They want digital assistants to help park or even drive autonomously. While auto makers (i.e., the OEMs) have mostly mastered their physical world, with stable supply chains able […]

Continue Reading...

Posted in Automotive Security | Comments Off on Secure automotive software at any speed

 

What happens when dishwashers attack the network?

Last month a researcher announced that a commercial dishwashing machine contained a dangerous vulnerability allowing a remote attacker to gain access to privileged assets on a connected network. Jens Regel of the German company Schneider-Wulf made the vulnerability public on Full Disclosure after contacting the vendor and waiting the customary 90 days. The vendor, Miele, has […]

Continue Reading...

Posted in Internet of Things | Comments Off on What happens when dishwashers attack the network?

 

Does software quality equal software security? It depends.

Software quality and security assurance both concern risk to the organization, but they do so for different reasons. Risk might be mission critical such as software on a scientific robot crawling another planet. Or risk might be associated with sensitive financial information. In the first example the integrity of the software is paramount; it is […]

Continue Reading...

Posted in Security Standards and Compliance, Software Architecture and Design, Software Composition Analysis | Comments Off on Does software quality equal software security? It depends.

 

Zeroing in on zero day vulnerabilities

Earlier this month WikiLeaks announced it had in its possession a cache of zero days allegedly from the Central Intelligence Agency. These unpatched vulnerabilities, it said, could affect Apple and Android devices (including TVs). It is suspected that exploitation of these vulnerabilities could allow the spy agency – or anyone else who knows about them […]

Continue Reading...

Posted in Fuzz Testing, Static Analysis (SAST) | Comments Off on Zeroing in on zero day vulnerabilities

 

Sophia Goreczky is the recipient of the 2017 YWCA Emerging Leader Award

Sophia Goreczky, Senior User Interface Design Engineer at Synopsys Software Integrity Group, is the recipient of 2017 YWCA Emerging Leader Award. She will be honored, along with four other award honorees, at an awards dinner on May 11, 2017 at the Fairmont Hotel in San Jose. Since 1984, the YWCA Silicon Valley Tribute to Women […]

Continue Reading...

Posted in Uncategorized | Comments Off on Sophia Goreczky is the recipient of the 2017 YWCA Emerging Leader Award