🦞🌯 Lobster Roll

Thread

Security vulnerabilities in BMW's ConnectedDrive (heise.de)

Stories related to "Security vulnerabilities in BMW's ConnectedDrive" across the full archive.

Security vulnerabilities in BMW's ConnectedDrive (heise.de)
Security Vulnerabilities in AT&T (Arris) Routers (schneier.com)
Pretty serious, I think. > Among the vulnerabilities are hardcoded credentials, which can allow "root" remote access to an affected device, giving an attacker full control over the router
Keyless BMW cars prove to be very easy to steal (hackaday.com)
Hardware-based Full Disk Encryption (In)Security (www1.cs.fau.de)
Rails 3.2.13, 3.1.12, and 2.3.18 have been released fixing 4 security vulnerabilities (weblog.rubyonrails.org)
PatchDroid is an application that fixes security vulnerabilities in EOL'd Android devices (patchdroid.com)
Impact of ZRTP library critical security vulnerabilities (silentcircle) (github.com)
DRAM security threat: Flipping Bits in Memory Without Accessing Them (github.com)
Paper is in the repo, slides: http://users.ece.cmu.edu/~omutlu/pub/dram-row-hammer_kim_talk_isca14.pdf
Anonabox Recalls 'Privacy' Routers for Security Flaws (wired.com)
CUFP 2013: Tom Hawkins: Redesigning the Computer for Security (youtube.com)
Security Considerations of the Intel x86 Management Engine (blog.invisiblethings.org)
Oral B Triumph Toothbrush with SmartGuideâ„¢ Security Advisory (gse-compliance.blogspot.com)
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale (media.ccc.de)
> [..] In this talk, we present several methods that make *the large scale security analyses of embedded devices* a feasible task. We implemented those techniques in a scalable framework that we tested on real world data. First, we collected a large number of firmware images from Internet reposi...
Stop the music! Booby-trapped song carjacked vehicles – security prof (theregister.co.uk)
Uncorrectable freedom and security issues on x86 platforms (mail.fsfeurope.org)
conorpp/u2f-zero - U2F USB token optimized for physical security, affordability, and style (github.com)
Freedom and privacy/security issues on mobile phones (replicant.us)
QuadRooter: New Android Vulnerabilities in Over 900 Million Devices (blog.checkpoint.com)
Technical information begins on page 7 of the [whitepaper](https://www.checkpoint.com/downloads/resources/quadRooter-vulnerability-research-report.pdf).
Security vulnerabilities fixed in Firefox 50 (mozilla.org)
See also the release notes: https://www.mozilla.org/en-US/firefox/50.0/releasenotes/ I felt the security fixes deserved more attention than "various security fixes".
How Skype fixes security vulnerabilities (hub.zhovner.com)
Survey of approaches for security verification of hardware/software systems (eprint.iacr.org)
After an intro to formal methods, it describes examples of hardware, software, and combined verifications of useful protection schemes. Recent work focuses more on HW/SW combined since it provides highest usability, security, and performance combination.
Using SDR to Take Control of Your Home Security System (hackaday.com)
Remote security exploit in all 2008+ Intel platforms (semiaccurate.com)
Verification of a practical, hardware, security architecture through static, info-flow analysis 2017 (cs.cornell.edu)
Intel's Management Engine is a security hazard, and users need a way to disable it (eff.org)
Understanding Pacemaker Systems Cybersecurity (blog.whitescope.io)
Rooting a Printer: From Security Bulletin to Remote Code Execution (tenable.com)
OSHUG Event #59 - CHERI CPU, Adding Security to Compilers, Trust & Provenance in Open Data (oshug.org)
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy (dnasec.cs.washington.edu)
Secret chips in replacement parts can completely hijack your phone’s security (arstechnica.com)