EDN’s Stephen Evanczuk recently confirmed that embedded systems face continuous threats by persistent individuals and entities armed with an increasingly sophisticated arsenal of tools.
Security
Cybercom chief confirms SCADA vulnerabilities
Navy Adm. Michael S. Rogers recently told a House panel that a range of cyber threats could potentially lead to a catastrophic failure if not properly addressed.
What cryptographers can learn from The Imitation Game
The Imitation Game is a 2014 British-American historical drama film about British mathematician, logician, cryptanalyst and pioneering computer scientist Alan Turing.
BlackEnergy targets critical infrastructure
A Trojan Horse malware program has reportedly “penetrated the software” that runs much of the nation’s critical infrastructure. According to an official ICS-CERT bulletin, the program successfully compromised numerous industrial control systems (ICSs) environments using a variant of the BlackEnergy malware.
Securing the IoT starts at the core
Writing for NewElectronics, Ben Jun of the Cryptography Research division of Rambus says securing the Internet of Things (IoT) starts at the core.
“The risks associated with a rapidly growing IoT include privacy, unauthorized access, malicious control and denial of service,” he explains.
Connected vehicles face cyber terrorism threat
A former head of the National Highway Traffic Safety Administration (NHTSA) recently told the 2014 SAE Convergence conference in Detroit that automakers and federal regulators must address potential “acts of terrorism” using connected vehicles.