This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.
Evaluation tests from BMW revealed that by integrating Intel® Active Management Technology, BMW could significantly increase its remote management capabilities and further strengthen security.