Intel is bucking the trend of FUD and overreaction when someone reveals a major flaw in a product that is on the market and are instead rewarding those who find ways to hack their automobiles. As we have seen recently, remotely exploiting onboard software and causing a car to crash is no longer something only possible in the movies and it seems that Intel is far more interested in working towards secure solutions as opposed to the auto manufacturers reliance on lawsuits and security through obscurity. Intel's Automotive Security Review Board is looking for bright minded individuals who will help bring PC style security to cars and is offering a free car (or cash equivalent) to the member who provides the best contribution. Check out the links at The Register if you are interested.
"Intel is getting serious – dead serious, apparently – about car hacking. And nothing says serious like a prize giveaway. If you join Chipzilla's new Automotive Security Review Board and make all the right noises, you can win a free new ride."
Here is some more Tech News from around the web:
- Molecular solders help make high-performance FETs @ Nanotechweb
- 8K monitors from Sharp to roll out in October, say report @ DigiTimes
- Implanted Cisco routers are coming after you and your insecurities @ The Inquirer
- Netgear ProSAFE Click 16-Port Ethernet Switch @ techPowerUp
- Epson 4630 Home Printer Review @ Hardware Secrets
associative thinking ?
associative thinking ? 🙂
“amd it seems that Intel”
when you say Intel, you think also AMD … or just a simple typo
obviously a conspiracy, no
obviously a conspiracy, no such thing as simple spelling mistakes
It’s that modified Harvard
It’s that modified Harvard CPU microarchitecture that All the microprocessors are based on that is the problem! So much trouble in keeping ring zero of the kernel/other ring’s code protected from miscreants. If Intel would just add some in the CPU based Hardware top and bottom of the stack pointers/registers to its x86 microarchitecture with the tack pointers/registers under the OS/ring zero protected mode control these buffer overflow security vulnerabilities would not be an issue. Those old Burroughs stack machine architecture based mainframes where certainly not vulnerable to any buffer overflow type hacks, and everything Code and Data ran in their own separate code and data stacks with the top and bottom of there respective stacks(stack Pointers) under the control of the hardware/OS(MCP on Burroughs systems) and there is not a Harvard microarchitecture to this day that could more securely run object oriented code than the old Burroughs stack architecture.
Incoherent to the average
Incoherent to the average gaming GIT/game-neck with no understanding of computing history and otherwise clueless to how technology actually works. How is that world of the rusting double-wide doing for you and your Smom!
you’re just a terrible writer
you’re just a terrible writer who regurgitates the same points in every comment section of every article on this site.