Open Source Insight:
IoT, Medical Devices, Connected Cars
All Vulnerable to Hackers
By Fred Bals, Senior Content Writer & Editor
The Internet of Things, pacemakers, and
driverless/semi-autonomous vehicles
were all in cybersecurity news this week.
And if that doesn’t get your pulse a-
racing, take a gander at threat vectors
such as electronic bank
robberies, digitally enabled high-seas
piracy and cyberattacks against electrical
grids (all real crimes, I kid you not).
Cybersecurity News This Week
Cybersecurity News This Week
In other news, Google released the latest
stable version of Chrome this Monday,
which includes patches for 30
vulnerabilities, including five high severity
issues (which incidentally earned four-figure
bounties for their reporters).
More open source security and
cybersecurity news follows…
• Open Source Security and the Internet of Things
• Are Medical Devices the Next Ransomware Target?
• Cybersecurity Is Dead
• As Open-Source Adoption Skyrockets in Enterprise, Linux
Addresses Ease of Use
• Electronic Setups of Driverless Cars Vulnerable to Hackers
• Why Car Companies Are Hiring Computer Security Experts
• Six Entrepreneurs, One Question: 'Talk About Your Best
Moment as a Manager'
• Encryption Technology in Your Code Impacts Export
Requirements
Open Source News
Open Source Security and
the Internet of Things
via IoT Now: As open source use continues to
increase, effective management of open source
security risk is increasingly important. But in the
rush to bring IoT devices to market, manufacturers
are often giving insufficient attention to the
additional security exposures created when systems
become increasingly connected.
via Cloud + Enterprise Technology: Given that
open source is at the core of commercial
application development, it should be no
surprise that almost all — 96 percent — of the
applications scanned in the COSRI
analysis utilised open source, with the
respective applications having nearly 150
unique open source components on average.
What may come as a surprise was that 67
percent of the applications containing open
source also had known vulnerabilities, and
legal risks were even more widespread.
The Need to Manage Open Source
Vulnerabilities and Licence Risks
via Black Duck blog (Mike Pittenger): All four
pacemakers examined contained open source
components with vulnerabilities, and roughly
50% of all components included vulnerabilities.
Most shockingly, the pacemakers had
an average of 50 vulnerabilities per vulnerable
component and over 2,000 vulnerabilities per
vendor.
Are Medical Devices the
Next Ransomware Target?
Cybersecurity Is Dead
via Forbes: Unsurprisingly, ransomware is exploding in
popularity, as the low-cost, easily usable malware proves
continually effective at extracting money. But there are
grander threat vectors looming: crimes such as electronic
bank robberies, digitally enabled high-seas
piracy and cyberattacks against electrical grids are not
science fiction premises; rather, they are real crimes that will
only grow more common.
via siliconANGLE: Open source technology is
not just a tool for developers anymore. Two 2016
surveys highlight the prevalence of open-source
adoption for businesses of all sizes. Both
surveys indicate that around 90 percent of
respondents — comprised of enterprise, mid-
market and small businesses — have all entered
into the open-source ecosystem.
As Open-Source Adoption Skyrockets in Enterprise,
Linux Addresses Ease of Use
Electronic Setups of Driverless Cars
Vulnerable to Hackers
via NY Times: In 2014, for example, some curious Tesla Model
S owners did some tinkering and claimed to have discovered a
customized version of a type of Linux software called Ubuntu.
Ubuntu 10.10 was first released in October 2010 and has not been
supported since December 2014. “In effect, that means the
operating system in your car was deprecated before you bought it,”
Mr. Rogers said.
via NY Times: But as more driverless and
semiautonomous cars hit the open roads, they
will become a more worthy target. Security
experts warn that driverless cars present a far
more complex, intriguing and vulnerable
“attack surface” for hackers. Each
new “connected” car feature introduces
greater complexity, and with complexity
inevitably comes vulnerability.
Why Car Companies Are Hiring
Computer Security Experts
Six Entrepreneurs, One Question: 'Talk
About Your Best Moment as a Manager'
via BostInno: From Lou Shipley, CEO,
of Black Duck Software, “It was so
cool to start something from scratch
and see it grow. But it’s bittersweet as
well. That’s when it’s time to go create
something else.”
via Black Duck blog (Phil Odence): US export
laws require companies to declare what
encryption technology is used in any
software to be exported. The use of open
source makes complying with these
regulations a tricky process.
Encryption Technology in Your Code
Impacts Export Requirements
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to Hackers

More Related Content

PPTX
Software Piracy
PPTX
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
PDF
State of IT security 2012
PDF
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
PPTX
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
PPTX
Vodqa why cybersecurity
Software Piracy
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
State of IT security 2012
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Vodqa why cybersecurity

What's hot (19)

PPTX
The Top Five Cybersecurity Threats for 2018
PPTX
10 IT Security Trends to Watch for in 2016
PPTX
10 Things to Watch for in 2016
PDF
Top 12 Cybersecurity Predictions for 2017
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
Symantec Intelligence Report: May 2015
PPTX
Data data every where!! Thomas O'Grady
PDF
Analytics Cybersecurity Predictions 2016
PDF
Analytics cybersecurity-predictions-2016
PPTX
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
PPTX
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
PDF
INFOGRAPHIC: The Evolution of Data Privacy
PPTX
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
PPT
Attitudes to online Privacy and Security
PPTX
Google & microsoft joins apple vs fbi
PPTX
Mobile Security Sticks and Carrots
PDF
The Future of Computer Security and Cybercrime
PDF
11 Reasons Why Your Company Could Be In Danger
PPTX
Network security threats ahmed s. gifel
The Top Five Cybersecurity Threats for 2018
10 IT Security Trends to Watch for in 2016
10 Things to Watch for in 2016
Top 12 Cybersecurity Predictions for 2017
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec Intelligence Report: May 2015
Data data every where!! Thomas O'Grady
Analytics Cybersecurity Predictions 2016
Analytics cybersecurity-predictions-2016
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
INFOGRAPHIC: The Evolution of Data Privacy
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Attitudes to online Privacy and Security
Google & microsoft joins apple vs fbi
Mobile Security Sticks and Carrots
The Future of Computer Security and Cybercrime
11 Reasons Why Your Company Could Be In Danger
Network security threats ahmed s. gifel

Similar to Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to Hackers (20)

PPTX
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PDF
Why computers will never be safe
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PPTX
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
PDF
Threat report h1_2013
PPTX
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PDF
Hacking 10 2010
PDF
6 Cybersecurity Trends to Watch in 2019
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PPTX
Top 15 security predictions for 2017
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
PPTX
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
PDF
Secureview 3
PPTX
Ransomware Review 2017
PPTX
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
PPTX
Enterprise Cyber Security 2016
PDF
1. security 20 20 - ebook-vol2
PDF
Hacking 04 2011
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Why computers will never be safe
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Threat report h1_2013
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Hacking 10 2010
6 Cybersecurity Trends to Watch in 2019
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Top 15 security predictions for 2017
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Secureview 3
Ransomware Review 2017
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Enterprise Cyber Security 2016
1. security 20 20 - ebook-vol2
Hacking 04 2011

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PDF
Open Source Rookies and Community
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
PDF
20 Billion Reasons for IoT Security
PPTX
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Open-Source- Sicherheits- und Risikoanalyse 2018
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - From Protex to Hub
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Rookies and Community
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
20 Billion Reasons for IoT Security
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A comparative study of natural language inference in Swahili using monolingua...
DOCX
search engine optimization ppt fir known well about this
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
The various Industrial Revolutions .pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Architecture types and enterprise applications.pdf
PPT
Geologic Time for studying geology for geologist
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Configure Apache Mutual Authentication
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Getting started with AI Agents and Multi-Agent Systems
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Convolutional neural network based encoder-decoder for efficient real-time ob...
A comparative study of natural language inference in Swahili using monolingua...
search engine optimization ppt fir known well about this
sbt 2.0: go big (Scala Days 2025 edition)
The various Industrial Revolutions .pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
Custom Battery Pack Design Considerations for Performance and Safety
CloudStack 4.21: First Look Webinar slides
Architecture types and enterprise applications.pdf
Geologic Time for studying geology for geologist
UiPath Agentic Automation session 1: RPA to Agents
Configure Apache Mutual Authentication
Taming the Chaos: How to Turn Unstructured Data into Decisions
2018-HIPAA-Renewal-Training for executives
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...

Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to Hackers

  • 1. Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to Hackers By Fred Bals, Senior Content Writer & Editor
  • 2. The Internet of Things, pacemakers, and driverless/semi-autonomous vehicles were all in cybersecurity news this week. And if that doesn’t get your pulse a- racing, take a gander at threat vectors such as electronic bank robberies, digitally enabled high-seas piracy and cyberattacks against electrical grids (all real crimes, I kid you not). Cybersecurity News This Week
  • 3. Cybersecurity News This Week In other news, Google released the latest stable version of Chrome this Monday, which includes patches for 30 vulnerabilities, including five high severity issues (which incidentally earned four-figure bounties for their reporters). More open source security and cybersecurity news follows…
  • 4. • Open Source Security and the Internet of Things • Are Medical Devices the Next Ransomware Target? • Cybersecurity Is Dead • As Open-Source Adoption Skyrockets in Enterprise, Linux Addresses Ease of Use • Electronic Setups of Driverless Cars Vulnerable to Hackers • Why Car Companies Are Hiring Computer Security Experts • Six Entrepreneurs, One Question: 'Talk About Your Best Moment as a Manager' • Encryption Technology in Your Code Impacts Export Requirements Open Source News
  • 5. Open Source Security and the Internet of Things via IoT Now: As open source use continues to increase, effective management of open source security risk is increasingly important. But in the rush to bring IoT devices to market, manufacturers are often giving insufficient attention to the additional security exposures created when systems become increasingly connected.
  • 6. via Cloud + Enterprise Technology: Given that open source is at the core of commercial application development, it should be no surprise that almost all — 96 percent — of the applications scanned in the COSRI analysis utilised open source, with the respective applications having nearly 150 unique open source components on average. What may come as a surprise was that 67 percent of the applications containing open source also had known vulnerabilities, and legal risks were even more widespread. The Need to Manage Open Source Vulnerabilities and Licence Risks
  • 7. via Black Duck blog (Mike Pittenger): All four pacemakers examined contained open source components with vulnerabilities, and roughly 50% of all components included vulnerabilities. Most shockingly, the pacemakers had an average of 50 vulnerabilities per vulnerable component and over 2,000 vulnerabilities per vendor. Are Medical Devices the Next Ransomware Target?
  • 8. Cybersecurity Is Dead via Forbes: Unsurprisingly, ransomware is exploding in popularity, as the low-cost, easily usable malware proves continually effective at extracting money. But there are grander threat vectors looming: crimes such as electronic bank robberies, digitally enabled high-seas piracy and cyberattacks against electrical grids are not science fiction premises; rather, they are real crimes that will only grow more common.
  • 9. via siliconANGLE: Open source technology is not just a tool for developers anymore. Two 2016 surveys highlight the prevalence of open-source adoption for businesses of all sizes. Both surveys indicate that around 90 percent of respondents — comprised of enterprise, mid- market and small businesses — have all entered into the open-source ecosystem. As Open-Source Adoption Skyrockets in Enterprise, Linux Addresses Ease of Use
  • 10. Electronic Setups of Driverless Cars Vulnerable to Hackers via NY Times: In 2014, for example, some curious Tesla Model S owners did some tinkering and claimed to have discovered a customized version of a type of Linux software called Ubuntu. Ubuntu 10.10 was first released in October 2010 and has not been supported since December 2014. “In effect, that means the operating system in your car was deprecated before you bought it,” Mr. Rogers said.
  • 11. via NY Times: But as more driverless and semiautonomous cars hit the open roads, they will become a more worthy target. Security experts warn that driverless cars present a far more complex, intriguing and vulnerable “attack surface” for hackers. Each new “connected” car feature introduces greater complexity, and with complexity inevitably comes vulnerability. Why Car Companies Are Hiring Computer Security Experts
  • 12. Six Entrepreneurs, One Question: 'Talk About Your Best Moment as a Manager' via BostInno: From Lou Shipley, CEO, of Black Duck Software, “It was so cool to start something from scratch and see it grow. But it’s bittersweet as well. That’s when it’s time to go create something else.”
  • 13. via Black Duck blog (Phil Odence): US export laws require companies to declare what encryption technology is used in any software to be exported. The use of open source makes complying with these regulations a tricky process. Encryption Technology in Your Code Impacts Export Requirements
  • 14. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.