Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now (www.tomshardware.com)
from floofloof@lemmy.ca to cybersecurity@sh.itjust.works on 14 Jul 14:34
https://lemmy.ca/post/47966576

#cybersecurity

threaded - newest

Bakkoda@sh.itjust.works on 14 Jul 15:36 next collapse

Operators is in the title and then never again in the article.

plenipotentprotogod@lemmy.world on 14 Jul 17:07 collapse

I suppose an extra sentence in the first paragraph could have made things clearer, but the AAR, which is the focus of the article, is an industry trade group made up of companies that operate trains in north America. Those are the “operators” in question.

sunzu2@thebrainbin.org on 14 Jul 20:32 collapse

Yes but they are not being named.

American fake news are allergic to naming the perps

We need Pete buttieg on this case tho

Railrails dindu nuffin!

WagnasT@lemmy.world on 14 Jul 19:13 next collapse

I had a vendor tell me their new wireless device doesn’t need a password because it’s proprietary and they’d need the hardware and software from said vendor. Hardware and software that literally anyone can buy from their website. My company bought them anyway. FML.

Trainguyrom@reddthat.com on 14 Jul 20:20 collapse

That’s just so typical that the AAR is refusing to take any action to correct something except when absolutely forced to