Software Integrity Blog

Author Archive

Robert Vamosi

robertvamosi


Posts by Robert Vamosi:

 

Flaw in Intel chips might allow ALSR bypass

A flaw in chip hardware might allow attackers to circumvent ALSR protection in operating systems and applications.

Continue Reading...

Posted in Software Architecture and Design | Comments Off on Flaw in Intel chips might allow ALSR bypass

 

The code used to create massive IoT-based botnet now public

The malware that may have created the IoT-based botnet that brought down a security website a few ago has been released to the public.

Continue Reading...

Posted in Internet of Things | Comments Off on The code used to create massive IoT-based botnet now public

 

IoT fueling larger DDoS attacks

Hacked internet-connected cameras and digital video recorders are to blame for a series of DDoS attacks that took down KrebsonSecurity last week.

Continue Reading...

Posted in Internet of Things, Software Architecture and Design | Comments Off on IoT fueling larger DDoS attacks

 

Tesla adopts code signing after remote access hack

After researchers discovered a way to hack into Tesla vehicles and reprogram their firmware, the auto manufacture pushed out not only a fix for that vulnerability, but a method for securing all the code running on the vehicle.

Continue Reading...

Posted in Automotive Security | Comments Off on Tesla adopts code signing after remote access hack

 

HERE opens automotive data services

A digital mapping service HERE collects real-time driving data from cars via its Open Location Platform.

Continue Reading...

Posted in Automotive Security, Internet of Things | Comments Off on HERE opens automotive data services

 

Security journalist silenced by IoT-based DDoS attack

Last week security reporter Brian Krebs suffered the largest DDoS attack in history, and lost his internet protection company and, briefly, no one had access to his site.

Continue Reading...

Posted in Internet of Things | Comments Off on Security journalist silenced by IoT-based DDoS attack

 

Researchers successfully hack a Tesla Model S remotely

While the Tesla Model S has been hacked before, this new attack can be carried out without any physical contact the car and from up to several miles away.

Continue Reading...

Posted in Automotive Security | Comments Off on Researchers successfully hack a Tesla Model S remotely

 

Power meters vulnerable to remote attacks, says ICS-CERT

ICS-CERT says power meters from two manufacturers are vulnerable to remote cross-site request forgery attacks (CSRF) and/or compromise.

Continue Reading...

Posted in General | Comments Off on Power meters vulnerable to remote attacks, says ICS-CERT

 

The Fed hires its first CISO

A retired U.S. Air Force brigadier general will be the U.S. government’s first federal cyber security chief (CISO).

Continue Reading...

Posted in General | Comments Off on The Fed hires its first CISO

 

In-vehicle infotainment vulnerabilities through the MirrorLink Interoperability Standard

Researchers say they can hijack a communication from a smartphone to a vehicle information system and potentially take control of a car’s systems such as brakes and steering.

Continue Reading...

Posted in Automotive Security | Comments Off on In-vehicle infotainment vulnerabilities through the MirrorLink Interoperability Standard