Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Learn how Continental AG, one of the world's leading suppliers to the automobile industry, migrated its server computer to Microsoft Windows Server 2003 and its 24,000 client computer to Windows XP Professional.
Evaluation tests from BMW revealed that by integrating Intel® Active Management Technology, BMW could significantly increase its remote management capabilities and further strengthen security.
This paper examines the major considerations manufacturers looking to add, upgrade of replace Enterprise Resource Planning (ERP) software should be aware of. By being cognizant of these aspects you'll ensure that you'll be able to select a solution that best fits your needs, both now and in the future.