Article Automotive Cybersecurity ECS General

The Automotive industry’s inadequate approach towards software (in the cars)

Introduction The automotive industry has witnessed a paradigm shift with the increasing integration of software in vehicles. Modern cars are no longer just mechanical devices with a motor, wheels and steering; they are now sophisticated machines having dozens of CPUs (called ECU), entire computers, high speed network to connect them (called CAN-bus) and relying on […]

News privacy Security

The PRICE of FREE

The idea of offering your product or a version of it for free has been a source of much debate. What is FREE and is FREE really, really, free as in gratis? Idea on writing this article came from reading this article on “Minimum Viable Free Product (MVFP)” by Nathan Taylor. Nathan is talking about “Minimum Viable […]

Security

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of […]

General

What are functional and non functional requirements and why both matter

In software engineering (and Systems Engineering), a functional requirement defines a function of a system or its component. A function is described as a set of inputs, the behavior, and outputs (see also software). Functional requirements may be calculations, technical details, data manipulation and processing and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describing all the cases where […]

General

How would you describe yourself?

Your LinkedIn profile can tell someone a lot about you. But, what are your strongest skills? How could you describe yourself in a few words?   Here is how: create a cloud of words from your profile enhancing the words that appear most.                 Here are more of […]

General

Security 101: December 2012

How safe is internet banking when I am using a smartphone to do it? I noticed several banks provided apps to do mobile internet banking and share trading but does it really work? Smartphones have much limited security functionality than desktops. However, they do share one weakness: they are both equally exposed to external attacks if they transmit non-encrypted data over non-encrypted Internet […]

Security

Skype distributing software(games) without user’s explicit approval ?

Since yesterday evening, the users of Skype for Windows who installed the EXTRAS features, have started to receive software automatically. The software comes from EasyBits Media, a company from Oslo, Norway. The Skype users have started to complain  yesterday afternoon and the drama seems to continue, without Skype officials to comment on this. The entire thread […]

Antivirus News

Microsoft Defender and dangerous alert levels

Description: This program changes various computer settings. Advice: This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you’re not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. Category: Tool       […]

News quoted Security

5 Apple security myths

Five Apple Security Myths — and the Disturbing Truths Five hard lessons With that in mind, here are five Apple security myths — and the brutal truth behind each: Myth: I don’t need antivirus and spam protection because I work on a Mac. Truth: The Mac OS X operating system is targeted less frequently by […]