How Connected Car Cyber Risk will Evolve
Credit to Author: Trend Micro Research| Date: Tue, 23 May 2023 00:00:00 +0000
Learn how connected car cyber risk will evolve in the coming years.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 23 May 2023 00:00:00 +0000
Learn how connected car cyber risk will evolve in the coming years.
Read moreCredit to Author: Fyodor Yarochkin| Date: Wed, 17 May 2023 00:00:00 +0000
An overview of the Lemon Group’s use of preinfected mobile devices, and how this scheme is potentially being developed and expanded to other internet of things (IoT) devices. This research was presented in full at the Black Hat Asia 2023 Conference in Singapore in May 2023.
Read more
Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how the program will continue to serve the cybersecurity community in the future.
In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.
Credit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Read moreCredit to Author: Sébastien Dudek| Date: Thu, 23 Dec 2021 00:00:00 +0000
In this entry we look into how Log4j vulnerabilities affect devices or properties embedded in or used for connected cars, specifically chargers, in-vehicle infotainment systems, and digital remotes for opening cars.
Read moreCredit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000
This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.
Read more