article thumbnail

Honda, Acura cars hit by Y2K22 bug that rolls back clocks to 2002

Bleeping Computer

Honda and Acura cars have been hit with a Year 2022 bug, aka Y2K22, that resets the navigation system's clock to January 1st, 2002, with no way to change it. [.].

article thumbnail

New Attack on VPNs

Schneier on Security

They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then. […] The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network.

VPN 343
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Honda cars in flashback to 2002 – “Can’t Get You Out Of My Head”

Naked Security

Where were YOU on the night of 17 May 2002? And what about the day after that?

94
article thumbnail

Anton’s Alert Fatigue: The Study

Anton on Security

Now, take your time machine to 2002. An easy answer I get from many industry colleagues is that we could have easily solved the problem at 2002 levels of data volumes, environment complexity and threat activity. Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Nah, didn’t do it.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Thinking back to 2002, SOX just came out, HIPAA was new and cool, while PCI DSS … was not born yet.

article thumbnail

Why do we call them trust boundaries?

Adam Shostack

Some digging into the history on my bookshelf: Howard and LeBlancs Writing Secure Code (2002) doesnt mention trust boundaries, and the sample threat models shown dont include any. Trust also calls back to the concept of a trusted computing base, the set of system functionality on which everything else depends. (We

130
130
article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Security Boulevard

On Jan 20, 2002 , exactly 20 years ago, I joined a “SIM” vendor that shall remain nameless, but is easy to figure out. I remember how our engineers struggled in 2002 with some API-based collection from a known firewall vendor. Thinking back to 2002, SOX just came out, HIPAA was new and cool, while PCI DSS … was not born yet.