As the automotive industry is moving towards digitalization, it’s important to plan the security of vehicles and in-vehicles systems. From new regulations to COVID-19, let’s have a look what the future of automotive cybersecurity holds for us!
As the automotive industry is moving towards digitalization, it’s important to plan the security of vehicles and in-vehicles systems. From new regulations to COVID-19, let’s have a look what the future of automotive cybersecurity holds for us!
Almost 10 years ago, the Open Web Application Security Project (OWASP) published the first version of the Top 10 Mobile Application Vulnerabilities, but where are we now? In this blog, I did a quick review a few of these common vulnerabilities to see if these findings still apply.
Keeping drivers safe and happy while still growing revenue can be challenging. Learn how connected technologies could be the key to finding the right balance.
Mental health and physical wellbeing are often overlooked when it comes to ticking off tasks from our to-do list. We’ve dedicated the whole of October to providing our employees support and outlets so that they can take some time for themselves.
Recently, I had the pleasure of joining my colleagues Will Hickie and Andrew Hoyt with Security Boulevard for a webinar on Automating App Security with AI: How to Secure a Million Lines of Code in Five Minutes! In this blog we discuss how a company can tell if one of its mobile apps have been hacked and how maybe Mobile Device Management Systems might not be enough.
One of the biggest hurdles in securing hardware is the cost. Understandably, this could prevent smaller device manufactures in securing their hardware, but why would this be an issue for the vehicle industry when the average connected car costs upwards of US$50K? In this blog, we look at what could be preventing the connected car industry from securing their hardware.
One of the major issues in the cybersecurity industry is the shortage of cybersecurity professionals. A 2019 study found that there was a global deficit of more than four million cybersecurity professionals and now we need to consider which areas are being impacted the most, how to address this shortage and what’s the best solution going forward.
Right now, Android smartphones are dominating the market, so it stands to reason that Android apps and devices are a prime target for cybercriminals. Rooting an Android device makes it even more vulnerable to attacks. In this blog we discuss why it’s so important for app developers to understand the risks to their app and data if they are running on a compromised device.
As major car brands include mobile apps in vehicles, it’s important to plan the security of these apps carefully. From apps that users install on their smart phones to unlock or start their car, to the apps that are used by service technicians for maintenance and diagnostics, the stakes are high if any of these apps are tampered with. In this blog, we look at the types of apps that can be found in a car, and how vital it is to protect them with a robust security solution.
With the increase in use of mobile apps, the risks of being attacked also goes up. One of the most common threats against iOS apps is Jailbreaking. In this blog, we look at the impact of a device being jailbroken, why an app developer should care if their app is being used on a jailbroken device and some of the reasons Jailbreak detection isn’t being used more in apps today.