Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted security zone on a chip. Exploitation, in either case, requires very little skill. Thus, a lot of the attacks today are carried out not by criminals with elite skills but those with very basic programming skills.
Robert Vamosi is a CISSP and Head of Corporate Content Strategy at Synopsys. He is the author of When Gadgets Betray Us: The Dark Side of our Infatuation with New Technologies and The Art of Invisibility (with Kevin Mitnick). He is featured in the history-of-hacking documentary, Code2600. As an award-winning journalist, Vamosi has been writing about information security for more than 15 years for sites including Forbes.com, ZDNet, CNET, CBS News, PC World and Security Ledger.
Posts by Robert Vamosi:
In the automotive world, recalls for electronics affect about five percent of the vehicles on the road. That means 5 out of every 100 vehicles today have a problem with their electronics. If we want to see more autonomous driving vehicles, that number must be improved. There needs be more robustness in the development process.
Posted in Automotive
To better understand the challenges ahead for fully autonomous vehicles, research teams over the last few decades have attempted to automate the process of driving. But early successes have not yet given us truly autonomous vehicles. Why?
Posted in Automotive
Cellular carriers would like to have their new 5G networks up by the end of 2018 or early 2019. One problem: they need a set of standards to create the new technology. Last weekend, tech representatives met and made significant first step for technology companies to start building out the necessary 5G chips and software.
Dr. Luca Amaru, Synopsys R&D engineer in DG’s Logic Synthesis team, has received the prestigious Donald O. Pederson Best Paper Award. The paper, “Majority-Inverter Graph: A New Paradigm for Logic Optimization,” was co-authored with Pierre-Emmanuel Gaillardon (University of Utah, Salt Lake City) and Giovanni De Micheli (EPFL, Lausanne, Switzerland). It appeared in the IEEE Transactions in Computer-Aided Design (CAD), the reference journal for technical papers in this space.
Posted in Superconducting Electronics
At the heart of the very cool intelligent connected vehicles (ICVs) of tomorrow is sophisticated software with artificial intelligence and powerful silicon chips all working together. These technologies will transform the traditional automotive supply chain from a mechanical-driven world to a digital one, where the user experience, reliability, safety, and value are created from silicon and software. It will allow OEMs and Tier 1 suppliers to further differentiate, and do so quickly. It also introduces, if done poorly, additional risks to privacy, safety, and reputation.
Posted in Automotive
It might have been a deleted scene from one of the Ocean’s Eleven movies. Data thieves hack into a major casino. They attack not through the main but a secondary network and, once inside, bootstrap their way into other parts of the casino network until they get lucky and find a cache of sensitive data that they proceed to steal.
A few weeks ago, the fitness company Strava published a worldwide heatmap showing specific routes their customers have taken over the years. While it is a visual heatmap of human activity on the planet, according to various security researchers the heatmap also exposed private areas such as routes within top secret military bases. This is not a conventional data breach where sensitive data was exposed through a specific vulnerability in the software or device. In this case the device and software operated as designed. Rather, the flaw appears to be in how the end-user has configured their device in terms of collection and sharing, and that’s a flaw all too common in the Internet of Things (IoT) today.
So far, connected autonomous vehicles have been tested in urban settings. That may be part of a larger business model that suggests on-demand driverless vehicles may soon dominate urban areas. It may also reflect a much harsher reality: While there’s plentiful internet within urban centers, there’s less so everywhere else.
Using previously studied data from NASA’s Kepler Space Telescope, a Google machine learning algorithm discovered two new planets orbiting a nearby star already known to have six planets. At a total of eight planets, that system matches our own solar system. It also begs a question: How many other planetary systems might be hiding in previously analyzed data?