VIDEO #HITB2016AMS CANsee: An Automobile Intrusion Detection System
Automotive security is a hot research area but up till now, research has only centered around how to attack with no single complete solution for defense.
Automotive security is a hot research area but up till now, research has only centered around how to attack with no single complete solution for defense.
The cliché of the hacker-in-a-hoodie lone wolf is out of date. Cybercrime gangs are now almost as sophisticated as the big businesses they are trying to steal from, leading to a new security arms race that companies are losing.
The increasing threat from organized cyber-criminals and state-sponsored cyber espionage means companies need to forget about the idea of a lone hacker, think through the credible threats to their systems, and deal with them in order to disrupt their attackers' business models.
The EU has signed an agreement with industry on cybersecurity and stepped up efforts to tackle cyber-threats which it hopes will trigger €1.8 billion of investment by 2020. It would be a big help to security suppliers, if the UK remained in the EU.
The new public-private partnership is part of a series of new initiatives to better equip Europe against cyber-attacks and to strengthen the competitiveness of its cybersecurity sector.
Darktrace, the U.K. cybersecurity startup whose backers include Autonomy founder Mike Lynch’s Invoke Capital, has closed $64 million in fresh funding.
The new round was led by global investment firm KKR, with participation from existing investor Summit Partners and new investors TenEleven Ventures and SoftBank.
Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor.
The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn't do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner.
Gigabyte has been swept into turmoil surrounding low-level security vulnerabilities that allows attackers to kill flash protection, secure boot, and tamper with firmware on PCs by Lenovo and other vendors.
Unconfirmed reports suggest the hardware vendor has used the "ThinkPwn" vulnerable code, thought to be born of Intel reference code, on four of its motherboards: Z68-UD3H, Z77X-UD5H, Z87MX-D3H, and Z97-D3H.
Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.
The world with "everything" having access to the internet appears inevitable, and with it, the potential to do a lot of good. However, our not paying attention to warnings from the past can quickly negate any benefit derived from the Internet of Things (IoT).
With all the high-profile data breaches and malicious attacks discussed by tech media outlets each day, one might conclude that considering cybersecurity a system design problem has been largely ignored.
Fans are risking the cyber-security of themselves and their employers because of their eagerness to access UEFA football information while they are abroad.
Cyber-criminals have used the Euro 2016 Football tournament to target victims with malicious websites. As well as this, official apps for the football fest are also leaking data, it has been claimed.