Software Integrity

Archive for the 'Automotive Security' Category

 

From mainframes to connected cars: How software drives the automotive industry

The automotive industry runs on software—but with increased software use comes an increased attack surface. Making safe, reliable vehicles starts with building secure software. Dr. Gary McGraw explains the importance of secure design principles and how to take the first step toward automotive software security. The original version of this article was published in The Security […]

Continue Reading...

Posted in Automotive Security, Maturity Model (BSIMM), Software Architecture and Design

 

Tesla key fob issues, Tor Browser zero-day woes, and you’ve got malware!

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Dude, don’t take my Tesla! Plus Tor Browser zero-day (already wiped away), and you’ve got malware (if you fall for it!). Watch this week’s episode […]

Continue Reading...

Posted in Automotive Security, Weekly Security Mashup

 

Ghost GPS routes, smart TVs are watching you, and securing open source

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Ghost route GPS hacks, smart TVs are watching you, and securing open source. Watch the latest episode below:     A $225 GPS spoofer can […]

Continue Reading...

Posted in Automotive Security, Open Source Security, Weekly Security Mashup

 

VPNFilter, BMW connected car vulnerability, and Nest IoT devices go offline

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup episode. What’s in this week’s episode, you ask? Russia vs. Ukraine, Beemer as the ultimate hackable machine, and Nest “smart home” devices. Learn more by watching the full episode below:   New VPNFilter […]

Continue Reading...

Posted in Automotive Security, Internet of Things, Software Architecture and Design, Weekly Security Mashup

 

NIST report on container security, GitLab Developer Report, VW and Audi remote hacks

Software Integrity Insight is your resource on the cyber security and open source security that made the headlines! 8 takeaways from NIST’s application container security guide via Synopsys Software Integrity: Chances are, hackers are aware of the growing popularity of containers as well, says technical evangelist Tim Mackey. Which is why we compiled eight takeaways […]

Continue Reading...

Posted in Automotive Security, Container Security, Open Source Security

 

Behavioral security at RSA Conference 2018

Wednesday, RSA 2018: On any given day, there are more than 150 sessions to choose from here. Good luck getting to even 5% of those. The good news is that attendees can get access to most of the sessions they missed after the fact, since the slide presentations are posted and videos are made of […]

Continue Reading...

Posted in Automotive Security, Events, Medical Device Security, Red Teaming

 

How to break car kits with Bluetooth fuzz testing

How do you find vulnerabilities and issues in Bluetooth-enabled devices? One of our favorite methods is fuzzing. Learn how to fuzz test Bluetooth car kits.

Continue Reading...

Posted in Automotive Security, Fuzz Testing

 

Securing IoT, Atlanta ransomware, Congress on cybersecurity

The Black Duck blog and Open Source Insight become part of the Synopsys Software Integrity blog in early April.  You’ll still get the latest open source security and license compliance news, insights, and opinions you’ve come to expect, plus the latest software security trends, news, tips, best practices, and thought leadership every week.  Don’t delay, […]

Continue Reading...

Posted in Automotive Security, Internet of Things

 

Who owns Linux? TRITON attack, app security testing, future of GDPR

We look at the three reasons you must attend the FLIGHT Amsterdam conference; how to build outstanding projects in the open source community; and why isn’t every app being security tested? Plus, going in-depth into the TRITON attack, why 2018 is the year of open source, how open source is driving both IoT and AI, […]

Continue Reading...

Posted in Agile, CI/CD & DevOps, Automotive Security, Data Breach, Open Source Security, Security Standards and Compliance

 

What’s under your hood? Connected car security and you

The auto industry constantly debuts new entertainment and safety features, but how secure is connected car software? How do you build in connected car security?

Continue Reading...

Posted in Automotive Security