By timothy from Slashdot's do-you-beat-your-electric-car department
thecarchik submits this interesting bit of flame: "Many are keen on the concept of open source electric cars — that is, electric cars where the built-in software can be tweaked, parameters can be changed, and in theory, the cars can be improved. Only it's a really, really bad idea. ... Even carmakers themselves have trouble with software--Fisker has issued a recall and apology recently with its Karma — so allowing average Joe to tweak the car's inner workings seems like a bad idea. Changing the characteristics of an electric car isn't as simple as re-jetting the carbs or swopping out the air filter."
Whether software is controlling electric
cars or not seems to me beside the point; access to the underlying software doesn't guarantee improvements, but blocking access to it doesn't stop car makers from making software mistakes — it only ensures that those few interested hackers who might be able to work around them have a harder time of it. (Not that tweaking car software
is new, or going away.)Read Replies (0)
By samzenpus from Slashdot's protect-ya-neck department
writes "While Julius Caesar likely never said 'Et tu, Brute?' the saying associated with his final minutes has come to symbolize the ultimate insider betrayal. In The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, authors Dawn Cappelli, Andrew Moore and Randall Trzeciak of the CERT Insider Threat Center provide incontrovertible data and an abundance of empirical evidence, which creates an important resource on the topic of insider threats. There are thousands of companies that have uttered modern day versions of Et tu, Brute due to insidious insider attacks and the book documents many of them."
Read on for the rest of Ben's review. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
author Dawn Cappelli, Andrew Moore, Randall Trzeciak
publisher Addison-Wesley Professional
reviewer Ben Rothke
summary Definitive resource on insider threatsRead Replies (0)