13-Oct-2012 Security related parts and Vehicle Interfaces
|
|
- Milo Aldous Dixon
- 5 years ago
- Views:
Transcription
1 13-Oct-2012 Security related parts and Vehicle Interfaces Robert Beckmann President Beckmann Technologies & BlueLink Diagnostic Solutions Member NASTF VSC
2 First generation security systems Simple signal exchange with key Fixed Resistors Infrared RF Transponder Bi-Directional Release immobilizer in PCM START Key Inserted
3 Modern high security systems No limits on networked components Simply a mouse click to add security func. Security Codes Key Inserted PCM Steering Unlocked Security Codes Transmission BCM Security Codes Security Codes START
4 Modern security systems, GM Global A 10+ ECUs With Security Functions
5 Typical Security parts Locked to immo-codes Shifter Interlock Ignition Switch Instrumentation PIN CODES Steering Locks Engine Management
6 A-Typical Security parts Any mismatched parts? Security is creeping into many parts!
7 A-Typical Security parts Locked to particular vehicle VIN codes Sensing and Diagnostic Modules, BCMs Headlights really? Automatic Transmission with integrated TCU HVAC Telematics
8 How will this trend impact our businesses? Using parts from a donor vehicle will no longer be possible. Parts can lock themselves making them useless. Higher costs to industry due to lack of recycled or remanufactured options. Lower payments to insurers because of lower value on salvage.
9 Mercedes Security Parts Policy available with LSID: 24hr emergency key request MY and up only Electronic ignition lock Electronic workshop key (green/orange) Electronic infrared control unit Electronic selector lever module (Model 215, 220, 230 only) Electronic steering lock.
10 Mercedes Security Parts Not Available: Any vehicle key ML AAM/EAM (Body Control Modules) Gear control unit from NAG2 (722.9 only) Repair Kit for Gear control unit from NAG2 (722.9 only) But anyone can buy a complete transmission Airbag squib wire pigtail (Dealers don t understand) Often any part which requires a VIN. Dealer interpretation of policy.
11 BMW Security Parts Policy: 6/29/2009 Thank you for your recent NASTF information request. The BMW Group supports the rights of owners to have the choice to decide where and how to have their BMW Group vehicles repaired and serviced. However, due to our commitment to safeguard the security of our owners vehicles we are unable to provide the parts you have requested. Vehicle Security Team BMW of North America, LLC (on behalf of the BMW Group)
12 BMW Security Parts Policy: ISPs report hit or miss being denied parts sales, left up to the local dealer. No consistent or public policy.
13 BMW Security Parts Programming: Majority of parts can be programmed using BMWs online diagnostic application using a J2534 vehicle interface. No key or other security data available to aftermarket under any circumstances.
14 Porsche [VW] Security Parts Policy: Porsche does not restrict the sales of any security related components. Security related parts and keys can be programmed via a standard J2534 interface. Andrew Lennon Porsche Cars of North America 3/23/2012
15 Two Types of Security Systems How are they programmed? Early systems. Simple embedded PIN codes Modern systems. Complex RSA/DES encryption software
16 Early security systems Simple signal exchange with key Fixed Resistors Infrared RF Transponder Bi-Directional Release immobilizer in PCM
17 How are keys produced, and parts initialized?
18 Simple embedded PIN code Nissan used as an example Scan tool or PC/VCI Code (Hack or Legit via SDRM) Blank Key or Fob UNLOCK CODES PCM/BCM ANY BLANK KEY IS LEARNED
19 Simple embedded PIN code Summary PIN code usually stored digitally (hidden) in vehicle. Security easily compromised. Unaware of any systems that have not been. Legitimate businesses funding hackers.
20 Simple embedded PIN code Pros/Cons PROS: Simple to program Blank keys generally available Codes can be obtained via SDRM CONS: Easily compromised
21 High Security System Vehicle is manufactured with unique random encrypted key codes. Initially just 8 keys but then more than 32. Limits number of keys which could be issued. Private key data is archived and maintained by Manufacturer only. Secure Database
22 High Security System Not simple PIN codes. Much more difficult to compromise. Uses DES public/private key encryption software like banks.
23 High Security System Pros/Cons PROS: Vehicles are much more secure But are still getting stolen CONS: Limited number of keys Must rely solely on manufacturer for entire life of vehicle Manufacturer ALONE has control of this data. Great right, remember SAAB?
24 High Security System Making keys, option #1: Ton of cash Data Secret Location Frustrated customer, up to 84 hour delay worst case! Eternity
25 High Security System Making keys, option #2: Secure, traceable transaction, over internet Data SDRM Key programmed in car Happy Customer 24/7/365
26 Porsche [VW] Security Parts Programming Provides unrestricted traceable access to security programming of keys and emissions-related ECUs. Porsche AG
27 High Security System Option #1: Inconvenient Expensive for OEM, dealers, and consumers Impossible to maintain 24/7/365 service 24hr key delivery not possible in many cases Security flaws since key is plug and play Option #2: 24/7/365 service possible nearly everywhere Small investment for vehicle security professionals Significant cost savings to OEM, no FEDEX OE revenue source from SDRM transactions Traceability for law enforcement via SDRM
28 The importance of the SDRM Ever expanding security functions in a-typical parts. Must expand mission of NASTF Vehicle Security Committee to address theft related parts restrictions by some manufacturers such as Mercedes and BMW. Get your Locksmith ID to support the work on the SDRM! Don t start this process with a car waiting in the bay! It can take 2 4 weeks to process your application.
29 Questions about the SDRM Question: I need to get an insurance bond. Answer: You only need a bond if you wish to get an LSID for one of your employees. Your declarations page from your business insurance policy is adequate for you as the business owner to obtain an lsid.
30 Questions about the SDRM Question: If my state requires a locksmiths license for locksmiths I need to get one for my shop. Answer: If you are a Vehicle Service Professional you do not need a locksmith license. BUT if your state requires you to be certified or licensed as a VSP you do need this license.
31 Goal of the SDRM and the VSC VSC Mission: The NASTF Vehicle Security Committee will facilitate the identification, prioritization, and correction of gaps in accessibility to vehicle security system information, and tools, while maintaining the security and integrity of vehicle anti-theft systems My personal goals: Provide a legitimate and traceable means of delivering and tracking security information needed to perform security related programming of service parts to facilitate vehicle repair, and provide a 24/7/365 means of supplying security solutions to a stranded motorist.
32 The cat and mouse game Automotive manufacturers pressured to more positively secure vehicles by insurance industry and consumer demands. Hackers are funded by legitimate users of security circumvention technology since other affordable options are often unavailable. Adding security technology to a-typical parts causes long term problems which are not adequately being addressed by our industry today. Who wins and who loses, and what are the long term effects?
33 The cat and mouse game Lack of legitimate tools funds hackers Typical non-oe automotive security tools.
34 Solutions Provide legitimate OE supported means of programming keys and security parts using SDRM/LSID, J2534, and online connectivity. De-Fund a community of hackers by doing so. Manufacturers save money by NOT having to support a costly 24/7/365 infrastructure. Less tool obsolescence - Long term vehicle serviceability Lower long term legacy costs to a manufacturer
35 Conclusions Be on guard when dealing with security enabled parts. Encourage vehicle manufacturers to develop security key and parts programming software which embraces the SDRM and standardized vehicle interfaces. Support NASTF! We are constantly looking for motivated individuals willing to help. Questions?
36 Thank you for attending this discussion!
Options for collision shops to perform scan services independently
Scan Tool and Services Overview for Pre-and Post-scanning Overview: Pre-and Post-scanning solutions available today for collision diagnostics vary widely for applications and capabilities. Some tools or
More informationConnected vehicle cloud
Connected vehicle cloud Commercial presentation 2018.05.17 Ericsson Connected Vehicle Cloud Commercial Presentation 2018-05-17 Page 1 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle
More informationConnected vehicle cloud Commercial presentation
Connected vehicle cloud 17.1 Commercial presentation 2017.07.01 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle can generate 1 GB of data per second By 2020 automakers could make
More informationHow to make Connected Car Reality? Dr. Walter J. Buga CEO
How to make Connected Car Reality? Dr. Walter J. Buga CEO 1 Connected Transportation Source: US DOT, January 2012 Core System Communications 1.3 Connected Vehicle Playing Field From a system perspective
More informationThank you for your purchase.
Thank you for your purchase. Please read and understand the complete installation instructions before attempting to install this simple wire-in product. If not installed properly, LaunchMAX will not function
More informationThe 10 Disaster Planning Essentials For A Small Business Network
The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days or even weeks due to data loss
More information10 IDN-INC.CA. Key Programming System. MVP PRO Programming Token Packages. Key Programing System & Tokens
Key Programing System & Tokens Key Programming System Innovative PY S YOU GO roadside key programming Free software* - updates are downloadable *(except DS190 & 198SD) dvanced technology designed with
More informationFebruary.18. Abrites Diagnostics for BMW/ Mini version User Manual. Abrites Diagnostics for BMW/Mini version User Manual 1.
Abrites Diagnostics for BMW/Mini version 28.0 1 List of revisions Date Chapter Description Revision 00. ALL Document created 1.0 18.02. ALL Document created 1. Introduction...3 2. Installation...3 3. Using
More informationPURPOSE BULLETIN CONTENTS AFFECTED VEHICLES BACKGROUND INFORMATION
Page 1 of 10 SUBJECT: SYSTEM INFORMATION UPDATE (2005 MODELS) No: DATE: June, 2005 MODEL: See Below CIRCULATE TO: [X] GENERAL MANAGER [X] PARTS MANAGER [X] TECHNICIAN [X] SERVICE ADVISOR [X] SERVICE MANAGER
More informationOE & Aftermarket Cooperation
OE & Aftermarket Cooperation Tools & Information Donny Seyfer AAM A little background Co-Owner Seyfer Automotive 1 of 4 ASE Master L1 techs in my shop NASTF T&E Co-chair Teach 15-20 Service Information/IT
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationSECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION
SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating
More informationThe Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005
The Fully Networked Car Trends in Car Communication Geneva March 2, 2005 Is The Connected Car Really A Major Business Opportunity? 2 Are We Flushing Money Away Having No Convincing Customer Benefits? 3
More informationPreventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent
More informationIntroduction. Read on and learn some facts about backup and recovery that could protect your small business.
Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records
More information2008 (PM) Caliber SRT4
Dealer Service Instructions for: Emissions Recall H32 Reprogram PCM OBD Monitors October 2008 Effective immediately, all repairs on involved vehicles are to be performed according to this notification.
More informationThe BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO
The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationmobridge Audio ipod Install Notes
mobridge Audio ipod Install Notes For use with the mobridge Audio ipod range of products mobridge Audio ipod Install Notes... 1 Common Install Notes... 3 mobridge Wiring Connection... 5 mobridge Audio
More informationZed-FULL- Immobiliser Solutions by IEA
Zed-FULL- Immobiliser Solutions by IEA Zed Full is the most professional and the unique all in one immobiliser device in the world with these features; Fix and crypto transponder cloning, Remote cloning
More informationConnect Vehicles: A Security Throwback
Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE
More informationThrough the years we ve come
A Closer Look at Vehicle Data Communications A Closer Look at Vehicle Data Communications by Steve Garrett members.atra.com Through the years we ve come to depend on the information we can collect with
More informationSuperchips 1705 MAX MicroTuner Ford Powerstroke 7.3L Turbo Diesel Vehicles Vehicle Programming Instructions
Page 1 of 12 Form 0126K 10/26/2004 Superchips Inc. Superchips 1705 MAX MicroTuner Ford Powerstroke 7.3L Turbo Diesel Vehicles Vehicle Programming Instructions PLEASE READ THIS ENTIRE INSTRUCTION SHEET
More informationQuick Start Guide Pre-and Post-Scanning.
Quick Start Guide Pre-and Post-Scanning. Learn what is required for each manufacturer OEM position papers and service information requirements www.oem1stop.com Collision Facility Scanning Options 1 2 3
More informationAbrites Diagnostics for Peugeot/Citroën User Manual
Abrites Diagnostics for Peugeot/Citroën User Manual Version: 1.7 www.abrites.com Manual verion: 1.7 1 List of Revisions Date Chapter Description Revision 19.Oct.2010 ALL First version of the document.
More informationPRIVACY STATEMENT Last Updated: January 1, 2017
PRIVACY STATEMENT Last Updated: January 1, 2017 The General Motors Family of Companies (including General Motors Company, OnStar, LLC ( OnStar ), and affiliates) (collectively, "GM" or "we") provides this
More informationQuick Start Guide Pre-and Post Scanning
Quick Start Guide Pre-and Post Scanning Emerging Technologies Tools Subcommittee Chuck Olsen AirPro Diagnostics Table of Contents Pg- 1) Getting Started, Pre and Post Repair Scanning Pg- 4) Research &
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More informationENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions
ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right
More informationWHICH PLATFORM For My Website
WHICH PLATFORM For My Website CONTENTS INTRODUCTION 1. 3. 4. 5 9. 10. 11. 13. 14. Introduction Your domain name Why choose a CMS platform? Choose the right Content Management System Add features Do you
More informationDisaster Preparedness and Recovery
Disaster Preparedness and Recovery Do you have a preparation plan? You probably didn t hesitate to develop a business plan when starting your company to ensure for the growth of your business. Similarly,
More informationPreventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI
Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges
More informationGeneral information Document template...1 Version overview...2. Release Definition and purpose Overview...3
. Legal notice Porsche reserves all rights to this document. This document may not be duplicated or disclosed to third parties without the written approval of Porsche. Porsche does not accept any liability
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationReprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC
Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Do you know that many times reprogramming is the only way to repair a vehicle and eliminate false DTCs? Have you ever stopped working
More informationPaystar Remittance Suite Tokenless Two-Factor Authentication
Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the
More informationThe 10 Disaster Planning Essentials
The 10 Disaster Planning Essentials For A Small Business Network 252 Plymouth Ave. S. Rochester, NY 14608 585-546-4120 info@capstoneitinc.com www.rochestercomputersupport.com The 10 Disaster Planning Essentials
More informationInstant evolution in the age of digitization. Turn technology into your competitive advantage
Instant evolution in the age of digitization Turn technology into your competitive advantage It s easy to underestimate how far we ve come in such a relatively short space of time, and how much the world
More informationThe Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio
Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three
More informationCryptoEx: Applications for Encryption and Digital Signature
CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server
More informationPRODUCT SERVICE INFORMATION
PRODUCT SERVICE INFORMATION Document number: P0019 For further technical information regarding testing, repairs or to search for New or Remanufactured Automotive electronic products, please visit www.injectronics.com.au,
More informationIMPORTANT DATES. Friday, January 18 th
IMPORTANT DATES Account access will be unavailable for the entire weekend beginning at 6:00 p.m. Internet Banking & Telephone Banking will also be unavailable for the entire weekend beginning at 6:00 p.m.
More informationBack to Main. Trade Show. iscan-ii / D91 Latest Versions (March, 2009)
Back to Main Trade Show iscan-ii / D91 Latest Versions (March, 2009) iscan-ii RENAULT V1.02 English/Chinese/Japanese 2009-03-02 iscan-ii CITROEN V1.02 English/Chinese/Japanese 2009-03-02 iscan-ii PEUGEOT
More informationE53 (X5) from 10/04 production with Premium Package (ZPP) or BMW Assist (SA 639)
SI B84 13 04 Phone, Navigation Systems meeknet.co.uk/e64 May 2005 Technical Service This Service Information bulletin supersedes S.I. B84 13 04 dated March 200 designates changes to this revision SUBJECT
More informationUsed Delightedly, User-Friendly MARUTI,MAZDA,MITSUBISHI,NISSAN,SUBARU,SUZUKI,TOYOTA, TATA, CHRYSLER, 8
Shor tcut keys Including CR501/601/611/801/811/821/910/920/981 DTC One-click Reading DTCs ER One-click Clearing DTCs I/M One-click Reading IM Readiness Statu? Tips and Help Car Model Suppor ting (46) Automotive
More informationOASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION
OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION Document Control Document Code SC1-014 Author(s) John Chelsom Date 08-01-2003 Version Version 1.0 Notes: This document uses a standard
More informationMOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK
E -BOOK MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK MOBILITY 1 04 INTRODUCTION 06 THREE TECHNOLOGIES THAT SECURELY UNLEASH MOBILE AND BYOD TABLE OF CONTENTS
More informationThe Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication
White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...
More information2017_Privacy and Information Security_English_Content
2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited
More informationPanda Security 2010 Page 1
Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency
More informationDonor Credit Card Security Policy
Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry
More informationGARAS Privacy Notice
GARAS Privacy Notice At GARAS we are committed to treating everyone with respect which is why we take treating your data seriously. We committed to being clear about how we collect, use and store your
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More information# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009)
Page 1 of 11 Document ID: 2221721 #06-00-89-051B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Subject: Key Code Security Rules and Information on GM KeyCode
More informationNISSAN MANUAL CONTENTS APPLICATIONS GENERAL OPERATION SPECIAL FUNCTIONS TIPS & HINTS REMOTE CONTROL PROGRAMMING
NISSAN NISSAN MANUAL CONTENTS APPLICATIONS GENERAL OPERATION SPECIAL FUNCTIONS TIPS & HINTS REMOTE CONTROL PROGRAMMING APPLICATIONS VEHICLE ENG TYPE MODEL YEAR SYSTEM CABLE ALMERA PETROL >2000 NATS 2,3
More informationHITAG-2 programmer Key tool USER MANUAL
HITAG-2 programmer Key tool USER MANUAL Version: 6.4 HITAG-2 PROGRAMMER USER MANUAL Document number 1 Date Sym Description new rev. 23-Feb-2006 id Initial Release 1.0 03-Nov-2006 id Changes in document
More informationSECTION B: Anti-Theft Passive Anti-Theft System (PATS) DIAGNOSIS AND TESTING Procedure revision date: 05/23/2008
SECTION 419-01B: Anti-Theft Passive Anti-Theft System (PATS) 2009 Mustang Workshop Manual DIAGNOSIS AND TESTING Procedure revision date: 05/23/2008 Anti-Theft Special Tool(s) 73III Automotive Meter 105-R0057
More informationA Ready Business rises above infrastructure limitations. Vodacom Power to you
A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationInstructions & Software Install Version 6.30a (Feb 2018) Copyright 2018 DealerTool.co.uk
DealerTool Instructions & Software Install Version 6.30a (Feb 2018) Copyright 2018 DealerTool.co.uk If you have any problems please email support@dealertool.co.uk Emails will always be responded to within
More informationSearch. Smart. Getting. About
Smart Search About Getting like Google, Yahoo and others: Search Engine Optimization (SEO) and Pay-Per-Click (PPC) advertising. SEO typically has a higher longterm ROI while short-term results are seen
More informationABRITES Diagnostics for Renault/Dacia User Manual
Version: 2.7 www.abrites.com Manual version: 2.7 1 List of Revisions Date Chapter Description Revision 11.11.2008 Release version of the document 1.0 18.03.2009 Update to V1.1 of the software 1.1 17.06.200
More informationSecuring Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013
Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring
More informationHelp Manual for A3/TT IMMO Key Function.
Help Manual for A3/TT IMMO Key Function. Connect OBD adapter to the transponder adapter first, then connect to the machine. PICTURE 1 Connect OBD adapter to the diagnostic socket of the car, choose IMMO
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationCybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale
Cybersecurity for the SMB CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized
More informationPerformance Testing BroadR-Reach Automotive Ethernet
White Paper Performance Testing BroadR-Reach Automotive Ethernet Key Elements for an Automotive-Specific Ethernet Test Regime Introduction Ethernet has long been the standard for data communication across
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage
More informationAcorn Trust Mobile Phone Policy
Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust
More informationDigital Transformation Drives Distributed Store Networks To The Breaking Point
Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority
More informationCode Reader 2 User manual
Code Reader 2 User manual Table of Contents 1. Setup. 2. Main operations. 3. Database. 4. PIN Calculator. 5. Transponder Catalogue. 6. EEprom Calculator. 7. Special Functions. 8. Transponder Programming.
More informationVerified by VINtrack
Verified by VINtrack VINtrack Software is the only VIN barcode software in the world that catches counterfeits and clones with its unique database. Just ONE stolen vehicle recovery will pay for the unit
More informationPage 1/14
http://pinblaster.com/buynow_exclusive.php Page 1/14 What is Pin Blaster EXCLUSIVE? Pin Blaster is a major update that we are performing for Pin Blaster. This update will be available only to a few users
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More informationTechnical Communications Systems Overview JLR WEB
Jaguar Land Rover elearning TC-JLR-WEB: Technical Communications Systems Overview JLR WEB Contents Overview 3 Document Details 9 Posting and Notification 13 Electronic Product Quality Reporting (EPQR)
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationTECHNICAL SERVICE BULLETIN
GROUP ELE NUMBER MODEL 2014MY Soul (PS) DATE 058 March 2014 TECHNICAL SERVICE BULLETIN SERVICE ACTION: BCM UPGRADE - IPM LOGIC This bulletin provides information related to the reprogramming of the Body
More informationPCM4-CAM NTV-KIT750. Overview
3950 NW 120 th Ave, Coral Springs, FL 33065 TEL 561-955-9770 FAX 561-955-9760 www.nav-tv.com info@nav-tv.com PCM4-CAM NTV-KIT750 Overview The PCM4-CAM Kit interfaces a backup camera input (with active
More informationRanger 900XP Speed Key Installation Digital Wrench Overview
Ranger 900XP Speed Key Installation Digital Wrench Overview Make Sure to verify that you have the most current update of Digital Wrench installed. Minimum required Version 3.6 update 07/08/14 Go to: Polaris
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationCompliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
More informationUptane. Securing Over-the-Air Updates Against Nation State Actors. Justin Cappos New York University
Uptane Securing Over-the-Air Updates Against Nation State Actors Justin Cappos New York University What do these companies have in common? What do these companies have in common? Users attacked via software
More informationWill you be PCI DSS Compliant by September 2010?
Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise
More informationNC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER
NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access
More informationWhy Continuity Matters
Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management
More informationWhy This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars
Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationINFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT
INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationKIT DESCRIPTION...p.3 SOFTWARE INSTALLATION..p.4 FIRST USE UPDATE.p.5 READING - PROTOCOL IDENTIFICATION.p.6
INDEX KIT DESCRIPTION...p.3 SOFTWARE INSTALLATION..p.4 FIRST USE UPDATE.p.5 READING - PROTOCOL IDENTIFICATION.p.6 - Totally automatic identification system...p.6 - Protocol identification system Brand/Model/Type....p.8
More informationPAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) Table of Contents Introduction 03 Who is affected by PCI DSS? 05 Why should my organization comply 06 with PCI DSS? Email security requirements 08
More informationInstruction manual Gulden desktop wallet 1.6.1
Instruction manual Gulden desktop wallet 1.6.1 Written by Aat de Kwaasteniet Translated by Arjan Bartlema Edited by amongst others Guldentest Date: 10 12 2016 Introduction Great that you have found your
More informationUptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017
Uptane: Securely Updating Automobiles Sam Weber NYU samweber@nyu.edu 14 June 2017 Credits Funded by DHS S&T CSD Work done by New York University University of Michigan Transportation Research Institute
More informationWhy Your Business Needs Enterprise-Strength Password Management
Why Your Business Needs Enterprise-Strength Password Management White Paper 2017 The Emergence of the Password and Hacking Secret Keys For over a half a century, the password, a secret sequence of characters
More informationSMARTnet provides you with the following advantages:
SMARTnet Service is an award-winning technical support service that gives you and your IT staff direct, round the clock access to Cisco engineers and extensive Cisco.com resources. Cisco SMARTnet is essential
More informationRoving Reporter: Ringing Up POS System Sales with Intel vpro Technology
Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology By Mark Scantlebury The market for point-of-sale (POS) machines is extremely competitive, but POS machine designers can get an edge
More informationHonda Independent Repair Website User s Guide
Honda Independent Repair Website User s Guide What is ServiceExpress? ServiceExpress is American Honda s Web-based system for delivering electronic service publications to the aftermarket. In ServiceExpress,
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationData Centers & Technology:
Data Centers & Technology: Risk in the digital landscape Presented by; Ralph de Mesquita Principal Risk Analyst, Risk Engineering UK Agenda Rise of cloud providers Four scenarios: where are the insurable
More informationRobert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe
Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international
More information