Am I Safe from Car Hackers Using Malware?

Am I Safe from Car Hackers Using Malware?

by Dan Lowe, from OEM Hub , on 20.09.2016

After purchasing my car, I wondered if I was going to regret my decision. At the car dealer, as I sat in the driver’s seat, the aviator style dashboard, array of digital displays, and innovative auto-sensing enhancements beckoned me to investigate further. As I was driving the car, I marveled at the plush leather seats and quick moving digital numbers of the speedometer jumping as I depressed the accelerator – my senses came alive. For 16-years, I have been driving a basic car with a plain dashboard, simple needle style speedometer, and creature comforts such as a AM/FM radio with a tape cassette. In my old car, I used to change my oil, replace my spark plugs, or fiddle around with the engine. Now, new automobiles have gone way beyond my capabilities as a do-it-yourself car mechanic. I have to take my car to the shop every time a fix it code appears on the dashboard display. I feel poorer after every visit to the mechanic because the new car requires a technician with a computer to diagnose my vehicle’s warning notifications. read more

Is There a False Sense of Security with Pin and Chip POS Technology

Is There a False Sense of Security with Pin and Chip POS Technology

by Dan Lowe, from OEM Hub , on 29.08.2016

After purchasing my car, I wondered if I was going to regret my decision. At the car dealer, as I sat in the driver’s seat, the aviator style dashboard, array of digital displays, and innovative auto-sensing enhancements beckoned me to investigate further. As I was driving the car, I marveled at the plush leather seats and quick moving digital numbers of the speedometer jumping as I depressed the accelerator – my senses came alive. For 16-years, I have been driving a basic car with a plain dashboard, simple needle style speedometer, and creature comforts such as a AM/FM radio with a tape cassette. In my old car, I used to change my oil, replace my spark plugs, or fiddle around with the engine. Now, new automobiles have gone way beyond my capabilities as a do-it-yourself car mechanic. I have to take my car to the shop every time a fix it code appears on the dashboard display. I feel poorer after every visit to the mechanic because the new car requires a technician with a computer to diagnose my vehicle’s warning notifications. read more

Why Don't You Provide Useful Malware Descriptions?

Why Don't You Provide Useful Malware Descriptions?

by George Yunaev, from OEM Hub , on 18.08.2016

After purchasing my car, I wondered if I was going to regret my decision. At the car dealer, as I sat in the driver’s seat, the aviator style dashboard, array of digital displays, and innovative auto-sensing enhancements beckoned me to investigate further. As I was driving the car, I marveled at the plush leather seats and quick moving digital numbers of the speedometer jumping as I depressed the accelerator – my senses came alive. For 16-years, I have been driving a basic car with a plain dashboard, simple needle style speedometer, and creature comforts such as a AM/FM radio with a tape cassette. In my old car, I used to change my oil, replace my spark plugs, or fiddle around with the engine. Now, new automobiles have gone way beyond my capabilities as a do-it-yourself car mechanic. I have to take my car to the shop every time a fix it code appears on the dashboard display. I feel poorer after every visit to the mechanic because the new car requires a technician with a computer to diagnose my vehicle’s warning notifications. read more

The Growing Threat of Malware within Medical Devices

The Growing Threat of Malware within Medical Devices

by Dan Lowe, from OEM Hub , on 24.06.2016

Malware Threats Are Rising Within Health Care Organizations. read more

Common Myths about Antimalware Applications

Common Myths about Antimalware Applications

by Dan Lowe, from OEM Hub , on 06.05.2016

Malware Threats Are Rising Within Health Care Organizations. read more

Opinion: RSA 2016 - Looking For the Next Big Thing!

Opinion: RSA 2016 - Looking For the Next Big Thing!

by Dan Lowe, from OEM Hub , on 07.03.2016

Here is a recap of the RSA event from a vendor perspective while offering practical advice for future conferences. read more

Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users

Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users

by Bitdefender OEM, from OEM Hub , on 24.02.2016

Bitdefender and 5nine have joined forces to hit a `sweet spot’ in the Hyper-V virtualization market in a product that brings the world’s highest quality of protection to companies’ virtual environments while maintaining optimum performance. read more

The Leading Encryption Services Provider Is Now Covered by the Leading Antivirus Solution

The Leading Encryption Services Provider Is Now Covered by the Leading Antivirus Solution

by Bitdefender OEM, from OEM Hub , on 03.12.2015

Bitdefender and Egress Software Technologies have joined forces in a successful partnership that will bring the highest level of antivirus security to the market’s leading encryption services. read more

4 Ways Secure Remote Monitoring Improves Businesses

4 Ways Secure Remote Monitoring Improves Businesses

by Guest, from OEM Hub , on 25.11.2015

Guest post courtesy of Michael Polaczy, Product Marketing Manager atTeamViewer, Bitdefender OEM and Technology Licensing Partner. read more

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

by Dan Lowe, from OEM Hub , on 29.10.2015

With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks. read more

<< Prev Next >>