New Autonomous Vehicle Security Guidelines: The Top News in Product Cybersecurity for the Week of July 4

Karamba Security

Happy 4th of July to all our readers in the United States! Here’s a look at some of the top stories from this past week in the world of automotive, IoT, Industry 4.0, and Enterprise Edge cybersecurity

Control Flow Integrity is Specified as a Crucial Security Control for Automated Vehicles by Leading OEMs and Tier 1, in New Industry Publication (Publication)


Control flow integrity is among the component level security controls that can provide reliable cybersecurity for automated vehicles, according to a new series of guidelines from Intel. Compiled by 11 leaders in the automotive industry, including Audi, BMW, Daimler, and Volkswagen, the guidelines include a series of principles for autonomous vehicle safety.

Vulnerability on Highly-Popular Platform Leaves Tens of Millions of Routers Open to Attack (Dojo by Bullguard)

rdk logo

Tens of millions of routers that use the RDK (Reference Design Kit) platform are vulnerable and expose entire networks to remote code execution attacks. In this post, the writer examines the dangers of attacks that target such IoT devices.

Report Finds Series of Vulnerabilities Affecting Huawei Equipment (Security Week)

blue picture

IoT security provider’s report asserts that memory corruption vulnerabilities are the most dangerous in software and that Huawei devices have a “staggering number of unsafe and potentially exploitable code conditions. The report also states that half of Huawei’s firmware images had one or more potential backdoor, which along with other vulnerabilities, could help the Chinese government’s espionage efforts.

D-Link is Required to Boost Security for its Devices After FTC Complaint About Hacking Fears and Security Flaws (Consumer Reports)

consumer reports

After the Federal Trade Commission issued a complaint that D-Link systems hasn’t provided sufficient security for its routers, webcams, and other IoT devices, the company will launch its own software security program to answer these shortcomings. The FTC said that the “preventable security flaws” meant that for years hackers could access customer’s live video and audio feeds.

Bluetooth Attack Reveals Potential IoT Security Threat (TechHQ)


Unpatched, older Bluetooth devices can make an easy target for hackers looking to hijack IoT devices. And with Bluetooth installed on countless IoT devices from connected automobiles to smart thermostats, hackers have no shortage of targets.

Read more

Want to learn more?

Contact Us


41000 Woodward Ave
Building East, Suite 350
Bloomfield Hills, MI 48304
Tel: +1 248-574-5171



24 HaNagar Street
Hod Hasharon
Tel: +972 9 88 66 113



Landstr. 264, Munich
Tel: +49 151 1471 6088