Google has unveiled the first prototype of its self-driving vehicle. The vehicle was first revealed in May, but the car Google presented was just a mockup without headlights. “Since then, we’ve been working on different prototypes-of-prototypes, each designed to test different systems of a self-driving car—for example, the typical ‘car’ parts like steering and braking, … continue reading
Every year there are a number of vulnerabilities exposed and exploited, but 2014 was bad in terms of software security. In the beginning of the year, Cenzic revealed the latest results from its 2014 Application Vulnerability Trends report and found that a majority of apps have at least one security vulnerability; but it wouldn’t be … continue reading
Software vulnerabilities have existed for as long as there has been software. Organizations and their developers have been locked in a cat-and-mouse game with the legion of hackers looking to steal data. Every time one breach is fixed, another is exploited, and ‘round and ‘round it goes. So, after Julian Assange and WikiLeaks, Edward Snowden, … continue reading
GitHub is warning users to update their Git clients as soon as possible. A critical security vulnerability has been found in Git, affecting all Git clients and software related to Git repositories such as GitHub for Windows and GitHub for Mac. “We strongly encourage all users…to be particularly careful when cloning or accessing Git repositories … continue reading
Many of our businesses store information about our customers. Perhaps customers set up accounts for e-commerce or for information access. Perhaps we install cookies and track their movements across our websites. Perhaps we gather demographics and create profiles of those individuals. And perhaps our customers upload and store data (such as photos or videos) that … continue reading
The Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT) has issued a warning about a vulnerability affecting Unix-based operating systems. The vulnerability, dubbed Shellshock, was discovered in the Bourne-Again Shell, also known as Bash. Bash is a popular Linux and Unix shell, and according to security researchers, the newly revealed bug could … continue reading
GM to launch hands-free driving by 2016 General Motors CEO Mary Barra has announced that Cadillac will offer advanced “intelligent and connected” vehicle technologies on 2017-model-year vehicles. The vehicle will offer GM’s advanced driver assist technology, Super Cruise, and will provide vehicle-to-vehicle communication technology. “A tide of innovation has invigorated the global auto industry, and … continue reading
The IEEE Center for Secure Design has published a report on the Top 10 software security design flaws (and how to avoid them). When it comes to making sure software is secure, too much of the attention is focused on bugs, and not enough of the conversation is about design flaws, according to Gary McGraw, … continue reading