Newest

  • Sunflower: The Highly Anticipated Digital Industry Incubator of 2024

    In early April 2024, amidst the bustling Web3 Carnival at the picturesque Victoria Harbour in Hong Kong, the Deputy Financial Secretary of the Hong Kong Special Administrative Region, Mr. Wayne Wong, emphasized the importance of striking a balance between development promotion and appropriate regulation, particularly in the realm of virtual assets. He emphasized that a comprehensive and clear regulatory system is key to fostering the sustainable development of virtual assets.
  • Sunflower,Borderless Green Philanthropic Digital Industry Incubator

    The greatness of a revolutionary technology lies not merely in its impact within the technical realm but in its transcendent disruption of production relations and people's daily lives. The internet epitomizes this, and so does blockchain.
  • The requirement for shampoo has continuously increased—how does Mosaly distinguish itself amidst the plethora of hair care brands?

    Hair care formulations stand as a predominant segment within the sphere of daily chemical products ubiquitously utilized by patrons. Amid the relentless quest for an elevated standard of living, such hair care essentials have ascended to a pinnacle of paramount interest among the populace of China. Presently, the consumer base exhibits a penchant for a diverse and specialized array of shampoo products, manifesting varied predilections towards attributes including restorative, smoothing, dandruff eradication, colouration, perming, and anti-hair fall properties, whilst bestowing increased scruti
  • Mosaly: A Novel Option for Sustainable Scalp Health

    In an era characterized by rapid lifestyles, there is a growing emphasis on health and ecological preservation. Within this scenario, the Mosaly brand has surfaced, presenting an innovative solution for scalp wellness with its anti-dandruff offerings, which are primarily formulated with Chinese tea polyphenols.
  • Mosaly: Narrating the stories of oriental plants, creating a philosophy of natural cleansing and care.

    Amid a burgeoning revival of Chinese cultural heritage, an innovative cohort of consumer brands that encapsulate Eastern aesthetics and traditional ethos have risen to prominence. Within this milieu, the "China Tea Craze" epitomizes this cultural resurgence. Within such a framework, Mosaly, as a trailblazing personal care brand that integrates the symbolism of Oriental tea culture into its offerings, has undoubtedly injected a refreshing vitality into the sector.
  • Mosaly: Dominating Douyin's Monthly Hair Care Charts, What Drives the Rise of China's New Hair Care Force?

    As the advent of the Double 11 shopping extravaganza draws near, Douyin's monthly hair care leaderboards have surprisingly catalyzed a resurgence of Chinese labels, with Mosaly hair care formulations rising prominently as the foremost vanguard. Across an array of indexes, it claims a preeminent station through both its unparalleled product efficacy and its veneration among luminaries, heralding not merely the ascendancy of Chinese craftsmanship but also mirroring a paradigm shift within contemporary consumer ethos.
  • The 10 Most Trusted Immigration Agents and Agencies of 2024

    Moving to a new country is never easy.The best immigration agents and agencies strive to provide their clients with the best possible outcome, regardless of their circumstances. Here you will find some dedicated professionals! Below are the top ten immigration consulting firms in the world chosen by hundreds of thousands of expats.
  • Sunflower, the Tears of the Era or the Layout of Leading Institutions?

    In 2024, the U.S. Securities and Exchange Commission approved the listing of the first batch of 11 Bitcoin spot exchange-traded funds (ETFs), with net inflows of approximately $10 billion within two months. Spot Bitcoin ETFs attracted most of the global attention and investment, serving as a rapid development and maturity example in the field and providing a template for achieving more results with other cryptocurrencies. Currently, the total market value of cryptocurrencies is approximately $26 trillion.
  • Global Times: Social media spat over 'Oppenheimer' sparks backlash as US netizens learn of horrific deeds by Japanese aggressors

    With the release of the movie Oppenheimer in Japan igniting heated discussion, terms including "Unit 731" and "Nanjing [Massacre]" have risen to the top of the search bar on American social media platforms in recent days, with many appalled by Japanese atrocities in China during World War II.

Links

2022 Automotive Cybersecurity Threat Report Was Published by Callisto Technology

2023-01-17    

By Callisto Technology ( https://www.callisto-auto.com )

With the development of "electrification, intelligence, and networking" in automobiles, automobiles have become "networked computers on wheels." Networking and intelligence provide automobiles with unprecedented capabilities, but in the meantime, they also bring more security threats. Since 2010, more than 1,200 security incidents related to smart cars that have been publicly reported, of which 207 occurred in 2020. In 2022, there were nearly 300 incidents, a 49% increase. In 2020, there were 30 CVEs (Common vulnerabilities & Exposures) directly related to automobiles announced, and by December 2022, the number of automobile related CVEs had soared to 284, an increase of 8 times in 2 years.

Since the beginning of 2022, the Callisto Automotive Threat Intelligence Center has analyzed automotive related cybersecurity information from media, academic research institutions, offensive and defensive competitions, social networking and deep, dark web. We also studied more than 300 automotive cybersecurity incidents and related 284 CVEs. The results show that smart cars are currently facing three major risks:

The digital key has become a new "entry point" for hackers to "unlock" the vehicle. Relay attack, replay attack and impersonation attack are the main techniques.

Intelligent services have become a new "control point" for hackers to "manipulate" vehicles, mainly in the form of leakage of identity credentials, abuse of service API, and illegal vehicle upgrades.

ECUs have become the "key" attack surface for hackers to explore firmware vulnerabilities, system vulnerabilities and third-party components.

Download full version of the report: https://www.callisto-auto.com/automotive-cybersecurity-threat-report-2022.pdf

The Threats to Critical Components

Component manufacturers often provide critical components to multiple OEMs, so a component vulnerability may exist on multiple models of different car brands.

The Callisto Automotive Threat Intelligence Center conducted research on more than 700,000 vulnerabilities from the CVE, NVD, CNVD, CNNVD and other vulnerability databases. 284 vulnerabilities related to automobiles are studied in depth. The studies show that these vulnerabilities are mainly related to critical components of connected vehicles, cloud services, and electrical charging facilities. The critical components include T-Box, IVI, CGW, ADAS, GPS, airbags, and OBD. Among these vulnerabilities, there are 148 related to cloud services. These vulnerabilities mainly involve the leakage of authentication credentials, the bypassing of authentication mechanisms, and the lack of API security. Hackers can use these vulnerabilities to remotely control a large number of cars, and sometimes they even gain control of cars from different car makers. There are 136 vulnerabilities related to vehicle ECUs. These vulnerabilities allow attackers to use replay attacks, relay attacks, etc. to gain control of car doors, engines, and other components remotely.

The Growing Threats of Intelligent Services

Under the new design methods such as "service-oriented architecture" and "software-defined automobile", the intelligent functions of automobiles are constantly being enriched. These design methods make the functional modules of automobiles more flexible and convenient. At the same time, it also facilitates the upgrade and update of vehicle functions, such as digital key, remote car control, advanced assisted driving, adaptive cruise, remote diagnosis and OTA upgrade, etc. These intelligent functions and services have been flexibly installed and configured on many brand models. However, this new design method also brings some security threats. Since the various components of the vehicle depend on each other, once a certain component fails, it may paralyze the entire vehicle and even endanger the personal safety of the drivers and passengers.

Trends and Challenges

Risks often come with the exposure of the attack surface and the drive of interests. In the foreseeable future, unclear security threats will gradually surface.

Fleets begin to face unprecedented cybersecurity challenges

Except for sci-fi movies, attacks on convoys are rarely seen in reality. However, because of the huge benefits of attacks, it will become obvious and targeted in the future. Especially large convoys are already using "digital fleet" technology to increase business revenue and reduce costs. Hackers may launch attacks and extortion against multiple vehicles by attacking OEMs production lines, fleet platforms, or certain vehicle.

Vendors need to take on an increasingly important security role

Suppliers are using proprietary and open-source technologies to jointly provide services for car manufactures. The richer the functions, the more code, and the more risks that come with it. There is no general method to protect car manufactures from supply chain threats. However, the cybersecurity measures of supply chain will greatly reduce the cybersecurity pressure of OEMs. Suppliers need to assume an increasingly important role in security.

Widespread use of intelligent driving poses new threats

Although there is still no clear time information for the commercialization of intelligent driving that covers L4, L2 has been accepted and popularized by drivers. Attacks against the intelligent driving domain will become a new research hotspot. The in-vehicle computing platform with strong computing power, remote OTA, and close integration with the vehicle control domain is bound to attract a large number of network security researchers to join in the security research on intelligent driving. Vehicle-road collaboration has introduced a new vehicle-cloud communication method, which brings new security risks.

About Callisto Technology

Callisto (Beijing) Technology Co., Ltd was founded by the world's first group of technical experts focusing on automotive cybersecurity. With years of experience in the field of automotive cybersecurity, we start from the perspective of attack and defense, and integrate advanced artificial intelligence and Knowledge Graph engine. Through the algorithm analysis of the massive multi-source heterogeneous messages, instructions and API services of the intelligent connected vehicles, so as to resist the new attacks against automotive manufactures and supply chains. We provide threat intelligence and defense capabilities for connected vehicles, and protect the security of core automotive assets and intelligent services.

Download full version of the report: https://www.callisto-auto.com/automotive-cybersecurity-threat-report-2022.pdf

Company:Callisto (Beijing) Technology Co., Ltd

Contact Person: Marketing Department

Email: contact@callisto-auto.com

Website: https://www.callisto-auto.com

Telephone: +86-18511588102

City:Beijing China, California USA

Address:Callisto Technology, Haidian District, Beijing

Disclaimer: This article is reproduced from other media. The purpose of reprinting is to convey more information. It does not mean that this website agrees with its views and is responsible for its authenticity, and does not bear any legal responsibility. All resources on this site are collected on the Internet. The purpose of sharing is for everyone's learning and reference only. If there is copyright or intellectual property infringement, please leave us a message.
Back to top
©copyright 2009-2020 The Budapest Times      Contact Us   SiteMap