In response to the news that pen testers have discovered mega vulnerabilities in car-hire service Uber which allowed them to identify individual drivers and passengers download their travel history, Lane Thames, Security Research and Software Development Engineer at Tripwire commented below.
Lane Thames, Security Research and Software Development Engineer at Tripwire:
“Finding multiple vulnerabilities in a product is not surprising. Developing secure software is difficult, even for seasoned programmers who understand security concepts. Unfortunately, our training and educational ecosystem is failing, in general, to properly train and educate technologists about the fundamentals of cybersecurity. The bulk of our human resources in the industry who are or will be developing our computerized technologies of today and the future are not being prepared for a future where cybersecurity issues will impact most of the technology that we use for our day to day activities: the vulnerability discoveries found in Uber are perfect examples. A system such as Uber should be designed, from inception, with high levels of security in order to protect the company and its customers. Uber, along with many other companies, are realizing that building secure systems is very hard, even for security conscious developers. As a result, bug bounty programs are becoming more prominent within the software industry. Bug bounty programs open the doors and allow ethical hackers an opportunity to put their skills to work for profit. On the flip side, companies minimize their costs because payment for service is only required for those who find vulnerabilities within the scope of the program. At the same time, their products can be made more secure. This is a major win-win for both the ethical hacker and the company sponsoring the bug bounty.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.