Cybersecurity

Bad idea: GPS tracking of cars

Recently, the media has been on discussion on making the country roads to be controlled by private company and Finnish cars envisaged the so-called mandatory. black box. On this discussion it has been several times mentioned that the Finnish Government has planned a mandatory monitoring devices for all cars to collect “road tax” based on

Debugging mechanism in Intel CPUs allows seizing control via USB port

https://www.scmagazine.com/debugging-mechanism-in-intel-cpus-allows-seizing-control-via-usb-port/article/630480/ Some Intel CPUs have JTAG over USB 3 debugging built-in. This could be good for debugging but is really bad for computer security. “starting with the Skylake processor family in 2015, Intel introduced the Direct Connect Interface (DCI) which provides access to the JTAG debugging interface via common USB 3.0 ports.” Having the DCI

John McAfee’s 3 major cybersecurity predictions for 2017 | CSO Online

http://www.csoonline.com/article/3155572/internet-of-things/john-mcafees-3-major-cybersecurity-predictions-for-2017.html Cybersecurity predictions: 1. IoT denial of service attacks on major Internet carriers will become commonplace 2. The anti-virus paradigm will finally been seen as a dead paradigm 3. Intelligence agencies will finally accept the fact that a sophisticated Nation State can perpetrate any hack and make it point to any Nation or agency that

FTC: D-Link Failed to Secure Routers, IP Cameras | Threatpost

https://threatpost.com/ftc-d-link-failed-to-secure-routers-ip-cameras/122895/ Legal process against companies that seem to have failed in IoT security in 2016 seems to be starting now. I expect that also several other companies will get similar treatment – very many companies have had same type security problems.

White House fails to make case that Russian hackers tampered with election | Ars Technica

http://arstechnica.com/security/2016/12/did-russia-tamper-with-the-2016-election-bitter-debate-likely-to-rage-on/ Released report does not have good solid evidence who was behind the attacks. This article also tells why it is hard to know who is really behind those attacks – it is well possible that hackers faked some of the evidence. Whoever did this, if they wanted to cause disruption and lack of faith,