Blog Posts
Vehicle Cybersecurity: The Jeep Hack and Beyond
Automobiles are often referred to as "computers on wheels" with newer models containing more than 100 million lines of code. This blog post highlights the first phase of our research …
• By Christopher King, Dan J. Klinedinst
In CERT/CC Vulnerabilities
When Is a Vulnerability a Safety Issue?
As you may have read in a previous post, the CERT/CC has been actively researching vulnerabilities in the connected vehicles. When we began our research, it became clear that in …
• By Christopher King
In CERT/CC Vulnerabilities
10 At-Risk Emerging Technologies
In today's increasingly interconnected world, the information security community must be prepared to address vulnerabilities that may arise from new technologies. This blog post highlights the findings of our report …