The Growing Dominance of Data Stirs Debate in the Auto Industry
Innovation can be very exciting, but it can also be challenging. The transitional periods that it takes us through often come with some smoothing out
Innovation can be very exciting, but it can also be challenging. The transitional periods that it takes us through often come with some smoothing out
Most advice for proper IoT firmware cybersecurity will mention the need for secure boot or secure data in transit. Let’s look at a side-channel attack
Most advice for proper IoT cybersecurity will mention the need for secure data in transit, aka SSL/TLS or IPsec. Let’s assume great protocol stacks, great
Throughout history, technological booms have ushered in new eras of evolution for us as a society. We’ve gone through transformations in our methods to carry
Firmware Developers Need To Know Quick recap. This is the second post in a long blog series diving into implementing cybersecurity for connected devices. Most
Firmware Developers Need To Know Quick recap. This is the first blog in a long blog series diving into implementing cybersecurity for connected devices. Most
Much like we have seen the capabilities and intricacies of computer systems expand exponentially, the same is occurring in the realm of automotive systems. This
A 19-year old, David Colombo, got thrusted into the spotlight after discovering a potential security issue for Tesla owners running a third-party application, TeslaMate. David
As Assaf Harel wrote for TechCrunch, “The buzz about 19-year-old Tesla hacker David Colombo is well deserved.” While his actions didn’t consist of direct steering
We no longer compare offerings to competing solutions but to the “app experience.” We know it when we see it. The app experience just works,
2021 was quite a year for cybersecurity. With a string of eye-opening attacks that demonstrated the vulnerabilities associated with public and private sectors and impacting
Minecraft, the popular video game first released in 2009, has grown a cult following over the past decade. The ultimate goal of Minecraft is to
Some time ago, I stumbled upon the term “Heisenbug.” What a perfect name for a bug! If you’re a coder, be forewarned this article may
With half of 2019 gone already (can you believe it?), in our opinion it’s an opportune time to reflect on the state of IoT security.
If you use Yocto as your tooling and build environment then you know the power and flexibility it brings to defining and creating runnable embedded
A Review of VoIP Communication Protocols WhatsApp was hacked last week and many users have yet to update their mobile phones applications. Anytime 1.5 billion
Last week, we released ZeroDayGuard v1.1, This release focused on the platform support requirements for our early adopters, plus some unique security features. Stopping hacks
Adoption of AGL as the embedded OS of choice for running IVI, instrumentation and telematics software by automotive manufacturers is accelerating. Several 2018 model year