Comments
Connected Cars Pose New Security Challenges
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/8/2018 | 2:11:05 PM
Long history
Alas, automakers have a history of downplaying (and even ignoring) exploits and vulnerabilities in their cars (see, e.g., forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/ ). Can't say as I particularly trust them.
Jon M. Kelley
50%
50%
Jon M. Kelley,
User Rank: Moderator
3/8/2018 | 11:38:24 AM
Re: Connected cars need extensive blackbox testing
Once Mobile Ransomware starts hitting connected cars, the U.S. government may get involved as it did with seatbelts and airbags.  Given history we may have decades of connected cars before government regulations force manufacturers to fix them.  Unfortunately for consumers, manufacturers have learned that remote software updates are very cost effective.  This will leave the connection available for others, as well as manufacturers, to try to turn it into a revenue stream. 
HamidK95001
50%
50%
HamidK95001,
User Rank: Author
3/6/2018 | 3:41:28 PM
Connected cars need extensive blackbox testing
A rapidly emerging trend is to apply extensive blackbox testing for connected cars and in particular fuzzing seems to be rather effctive in exposing hidden weaknesses. 


Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10016
PUBLISHED: 2019-03-25
GForge Advanced Server 6.4.4 allows XSS via the commonsearch.php words parameter, as demonstrated by a snippet/search/?words= substring.
CVE-2019-10018
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case.
CVE-2019-10019
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PSOutputDev::checkPageSlice at PSOutputDev.cc for nStripes.
CVE-2019-10020
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for x Bresenham parameters.
CVE-2019-10021
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function ImageStream::ImageStream at Stream.cc for nComps.