article thumbnail

Cable Haunt flaw exposes 200M+ Broadcom-based cable modems at remote hijacking

Security Affairs

The reason for this is that the vulnerability originated in reference software, which has seemingly been copied by different cable modems manufacturers when creating their cable modem firmware. Secondly the vulnerable endpoint is hit with a buffer overflow attack, which gives the attacker control of the modem.”

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. This paper is the cybersecurity specialists making the argument that cyber will fit into safety, and how to do so. In a sense, this white paper captures a strategic threat model.

Paper 56
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

We do white papers and thought leadership at conferences. On the operating side, whether it’s manufacturing or energy generation, or whatever, those folks are not security experts and they don’t have a connection with IT security people.” It’s membership and cross-industry driven.” OT and IT convergence.

Risk 120
article thumbnail

Proposed Changes to FDA Guidance for the Content of Premarket Submissions for Management of Cybersecurity in Medical Devices: What you Should Know

HL Chronicle of Data Protection

The new draft premarket cybersecurity guidance provides information designed to aid manufacturers in determining how to meet the agency’s expectations during premarket review of medical devices. This is the first time that FDA has been clear as to its expectation that it be created by manufacturers and provided to customers.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. The CUPS model, or Control and User Plane Separation, isn’t new, but it shows how 5G relies on more virtualized workloads and cloud-based systems.

Risk 136
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. Marketing teams can create and share marketing content such as online blog posts, white papers, e-books, or short videos that can be posted on social media platforms and targeted towards various audiences. Customer Data Platforms (CDP).

article thumbnail

Jason R. Baron of Drinker Biddle & Reath LLP: eDiscovery Trends 2018

eDiscovery Daily

So, there’s the question of liability, i.e., whether the software developer or manufacturer are held to a standard of strict liability, and what kind of ethical considerations are involved. I still have a passion for how to preserve and how to access public records in digital form. We talk about leadership.