Software Integrity Blog

Archive for the 'Automotive Security' Category

 

More resources needed to improve connected car security

Connected car security is a priority of the automotive industry, according to a recent report. But the shortage of resources and skills is a challenge.

Continue Reading...

Posted in Automotive Security, Featured

 

Study shows security challenges in the auto industry

Automotive cyber security is a high-stakes endeavor, as software vulnerabilities in connected cars can threaten lives. A new report reveals industry concerns.

Continue Reading...

Posted in Automotive Security

 

GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.

Continue Reading...

Posted in Automotive Security, Government Security, Internet of Things

 

From mainframes to connected cars: How software drives the automotive industry

The automotive industry runs on software—but with increased software use comes an increased attack surface. Making safe, reliable vehicles starts with building secure software. Dr. Gary McGraw explains the importance of secure design principles and how to take the first step toward automotive software security. The original version of this article was published in The Security […]

Continue Reading...

Posted in Automotive Security, Maturity Model (BSIMM), Software Architecture and Design

 

Tesla key fob issues, Tor Browser zero-day woes, and you’ve got malware!

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Dude, don’t take my Tesla! Plus Tor Browser zero-day (already wiped away), and you’ve got malware (if you fall for it!). Watch this week’s episode […]

Continue Reading...

Posted in Automotive Security, Weekly Security Mashup

 

Ghost GPS routes, smart TVs are watching you, and securing open source

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Ghost route GPS hacks, smart TVs are watching you, and securing open source. Watch the latest episode below:     A $225 GPS spoofer can […]

Continue Reading...

Posted in Automotive Security, Open Source Security, Weekly Security Mashup

 

VPNFilter, BMW connected car vulnerability, and Nest IoT devices go offline

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup episode. What’s in this week’s episode, you ask? Russia vs. Ukraine, Beemer as the ultimate hackable machine, and Nest “smart home” devices. Learn more by watching the full episode below:   New VPNFilter […]

Continue Reading...

Posted in Automotive Security, Internet of Things, Software Architecture and Design, Weekly Security Mashup

 

NIST report on container security, GitLab Developer Report, VW and Audi remote hacks

Software Integrity Insight is your resource on the cyber security and open source security that made the headlines! 8 takeaways from NIST’s application container security guide via Synopsys Software Integrity: Chances are, hackers are aware of the growing popularity of containers as well, says technical evangelist Tim Mackey. Which is why we compiled eight takeaways […]

Continue Reading...

Posted in Automotive Security, Container Security, Open Source Security

 

Behavioral security at RSA Conference 2018

Wednesday, RSA 2018: On any given day, there are more than 150 sessions to choose from here. Good luck getting to even 5% of those. The good news is that attendees can get access to most of the sessions they missed after the fact, since the slide presentations are posted and videos are made of […]

Continue Reading...

Posted in Automotive Security, Events, Medical Device Security, Red Teaming

 

How to break car kits with Bluetooth fuzz testing

How do you find vulnerabilities and issues in Bluetooth-enabled devices? One of our favorite methods is fuzzing. Learn how to fuzz test Bluetooth car kits.

Continue Reading...

Posted in Automotive Security, Fuzz Testing