Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
6 Questions to Ask While Buying a Connected Car
Newest First  |  Oldest First  |  Threaded View
Mcmoore08
50%
50%
Mcmoore08,
User Rank: Author
3/13/2019 | 3:55:06 PM
confidential info
Good posting here! This is especially true where someone thinks they are having a classified conversation and it is ok through the bluetooth within their car. Your car is NOT a SCIF.
szurier210
50%
50%
szurier210,
User Rank: Moderator
3/13/2019 | 12:58:17 PM
Re: IoT Devices
Just as follow-up, I have been shopping with my son for a new car over the past few days. I found the salespeople to be monumentally unware of the technology they are selling. I think Apple CarPlay is cool technology, though some may think the hard-wired USB connectivity is old school versus a wireless option. This is a major point: If you read the reviews, Apple and the car companies were going for safety first over convenience. So now with CarPlay there is a way to use Siri to ask for calls and verbally send texts without taking your eyes off the road. As a step toward a more automated experience that is huge. Some of the reviewers complained that they couldn't stream videos when their wives went into a store, but that's not a big deal. Others complained that Siri still can't read back emails. All in due time. For now, it's really great that CarPlay is basically a platform that you can update by simply updating your iPhone's iOS. I checked with Apple Support and they told me to also check with the dealer to see if there are any firmware updates on the car stereo from time to time. If anyone else has any other observations based on using a connected car, please share. I'm feeling like the public is very vulnerable so the more tips and insights we can offer people the better. 
bangbakat
50%
50%
bangbakat,
User Rank: Apprentice
3/9/2019 | 1:00:14 PM
Re: IoT Devices
very nice
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
3/8/2019 | 9:32:57 AM
Re: IoT Devices
I guess sometimes you never know the popularity something will have until it comes to pass. Otherwise, she would have lawyered up and protected that ubiquitous voice.
Munjero
100%
0%
Munjero,
User Rank: Apprentice
3/7/2019 | 1:05:01 PM
Re: IoT Devices
Voice of Siri:  no, not a lot of money, she had no idea that her voice was going to be used for Siri:  https://www.huffingtonpost.ca/2013/10/04/voice-siri_n_4043134.html

 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/5/2019 | 3:10:38 PM
IoT Devices
Another consideration - my 2014 Honda CRV has a built in GPS navigation system, easy to use and extremely helpful.  Yes questions about it of course but my wife's NEW 2018 CRV has gone to the IPhone for the global positioning service and it's not easy to setup either.  We live with the voice of Siri now.  But now we have an external internet device directly connected to the internals of the car, another entry point through the phone which raises a new family concerns - the phone itself, as always - the interface to the car (physical cable but wireless through the phone) and any external vulnerabilities through GPS ----- which is why I like the 2014 better.  Besides Siri is a bitch and my old car has a nice pleasant lady.  She probably talks to me too on the POS system at Kroger and in hosted meeting rooms too.  (Who is, by the way, this elusive female voice?  She has to make a ton of money).


Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27621
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
CVE-2020-27620
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
CVE-2020-27619
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2020-17454
PUBLISHED: 2020-10-21
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal b...
CVE-2020-24421
PUBLISHED: 2020-10-21
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.