Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Intel Takes On Car Hacking, Founds Auto Security Review Board
Newest First  |  Oldest First  |  Threaded View
jscott490
50%
50%
jscott490,
User Rank: Apprentice
9/17/2015 | 12:16:11 PM
Looks like marketing to me
Intel doesn't have much of a presence in automotive electronics (they don't even show up in top 10 of automotive electronics providers), so this seems like more of a move to get into a market that they have continually failed in than anything else, to me. Even the infotainment systems are more likely to use smart phone processors and electronics where Intel also doesn't play well.

As seen from the hacker stuff, the weak point in all automotive electronics is the infotainment systems. They have not been protected as well as they should be, and they have been used along with in-depth research to reprogram the micros that are on the CAN bus and send erroneous messages. Harden the entry point (i.e. infotainment) and the rest will be fine.
Enrico Fontan
50%
50%
Enrico Fontan,
User Rank: Strategist
9/15/2015 | 12:28:22 PM
New security controls
As started in the SCADA systems, we need to adopt security controls also in the Automotive environment.

Car system integration can be a big step, think about engines interacting with GPS to understand terrain data (objective:save fuel).  

We still can have "isolated" systems, but as in other IT systems we need to think about data flow and data access permissions.

On the other hand, without such controls system integration can bring several risks.
DarkerMind
50%
50%
DarkerMind,
User Rank: Apprentice
9/15/2015 | 11:27:09 AM
Re: Vehicle hacking
@DontBeknown You make excellent points. I think it was naive to design this system without planning for security
DontBeknown
100%
0%
DontBeknown,
User Rank: Apprentice
9/14/2015 | 11:19:45 PM
Vehicle hacking
It is interesting how we think that we "need" our engine, brakes, transmission, etc. to be connected via network to our entertainment system and internet.

They've been running into this in the aircraft world as well.  In the past, you were not allowed to have ANY primary system in an aircraft hooked into any other system.  In otherwords - Engine # 1 circuts would be separated physically and electronically from any of the other systems (primary navigation did this as well).  All primary systems would be done this way for safety reasons - you wouldn't want a problem on Engine #2 to take out the controls for Engine #1 now - would you?  

With the advent of networking - they (engineers) figure they can do it better - forgetting all that has been learned about safety in the past.  Why would you ever hook the entertainment system (and internet) to engine controls?  Or brakes? or the transmission?  It need not be that way. It's gone as far as hackers being able to OPEN THE DOORS on moving vehicles on the freeway!!  Really?  Is this level of integration required or is it just an open barn door of "we can so we will"? 

Take this level of sophistication out of cars.  It is not needed.  The entertainment system (and navigation system) should be separate from the drivetrain and safety equipment in ANY vehicle.  This level of networked BS is stupid, and dangerous.


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31922
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
CVE-2021-32051
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
CVE-2021-32615
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
CVE-2021-33026
PUBLISHED: 2021-05-13
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the ca...
CVE-2021-31876
PUBLISHED: 2021-05-13
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with ...