Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

6/5/2016
08:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

How Risky Is Bleeding Edge Tech?

Experts with the Carnegie Mellon University Software Engineering Institute rate 10 up-and-coming technologies for risk.
Previous
1 of 11
Next

Image Source: Adobe Stock

Image Source: Adobe Stock

Most seasoned information security experts know that when a new technology starts taking off like wildfire, chances are pretty good that someone's going to get burned. The curve of innovation for decades has generally traversed a path where engineers think of features, bells and whistles first, security last.

As a new crop of exciting technology like smart medical devices, drones and driverless cars jockeys for position in the mainstream, the question is how much risk they'll bring to the table. A panel of experts with the Carnegie Mellon University Software Engineering Institute recently took a look at some of the hottest tech making its way to the forefront to answer this very question. Here are some of the highlights from the report, 2016 Emerging Technology Domains Risk Survey.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
6/6/2016 | 7:45:38 AM
VR
When it came to choosing which VR headset I would buy earlier this year, I went over and over in my head with all the different pros and cons.

While the Vive seemed like the Superior headset, I was worried about HTC's potential financial difficulties. 

Admittedly in the end I got both and will now sell my Rift on, but I do still wonder how quickly VR is going to catch on. I think it might take a couple of years, at which point the Vive will be oudated, but by then hopefully we'll be looking at second generation devices.
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27569
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27570
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27571
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27572
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2021-27573
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.