Listen "The Security of Visually Impaired Self-Driving Cars"
Episode Synopsis
How long does it take you to tell the difference between fried chicken or poodle? What about a blueberry muffin or Chihuahua? When presented with these photos, it requires a closer look to differentiate the differences.
It turns out that self-driving car cameras have the same problem. Recently security researchers were able to confuse self-driving car cameras by adhering small stickers to a standard stop sign. What did the cameras see instead? A 45 mph speed limit sign.
The dangers are self-evident. However, the good news is that there are enough built-in sensors and cameras to act as a failsafe. But followers of our podcast know that other technologies with other known vulnerabilities might not be as lucky.
Other articles discussed:
New law would making re-anonymizing data illegal
Encoding malware into physical strands of DNA
Wiretapping your Amazon Echo
Responsible ways to share a vulnerability
Tool of the week: Macie, Automatically Discover, Classify, and Secure Content at Scale
Panelists: Cindy Ng, Jeff Peters, Kris Keyser, Mike Buckbee
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
It turns out that self-driving car cameras have the same problem. Recently security researchers were able to confuse self-driving car cameras by adhering small stickers to a standard stop sign. What did the cameras see instead? A 45 mph speed limit sign.
The dangers are self-evident. However, the good news is that there are enough built-in sensors and cameras to act as a failsafe. But followers of our podcast know that other technologies with other known vulnerabilities might not be as lucky.
Other articles discussed:
New law would making re-anonymizing data illegal
Encoding malware into physical strands of DNA
Wiretapping your Amazon Echo
Responsible ways to share a vulnerability
Tool of the week: Macie, Automatically Discover, Classify, and Secure Content at Scale
Panelists: Cindy Ng, Jeff Peters, Kris Keyser, Mike Buckbee
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
More episodes of the podcast State of Cybercrime
Black Hat Cartels
31/10/2025
Supply Chain Attacks
20/09/2025
ShinyHunters' CRM Heist
18/08/2025
Salt Typhoon Returns
25/07/2025
Copilot's Zero-Click Vulnerability
18/06/2025
UK Retail Under Siege
21/05/2025
The Oracle Breach Debate
19/04/2025
$1.5B ByBit Crypto Heist
14/03/2025
DeepSeek Disruption
04/02/2025
U.S. Treasury Breach
15/01/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.