Home Security BlackBerry's Jarvis scans code for vulnerabilities
×

Message

Failed loading XML...

BlackBerry's Jarvis scans code for vulnerabilities

Jarvis aims to keep us safe by spotting vulnerabilities in code that could be used to manipulate the real world.

People are understandably worried about security vulnerabilities in software, and that concern is all the greater when it comes to exploits that have the potential to kill us, for example by causing a car to veer into the path of oncoming traffic.

So BlackBerry has announced Jarvis, an automated system for scanning binary code for vulnerabilities.

Initially aimed at the automotive industry, BlackBerry sees other applications in segments such as healthcare, industrial automation, aerospace, and defence that could use Jarvis.

Offered as a cloud service, Jarvis is designed to scan the entire code for a vehicle, even where a multi-tier supply chain is involved. Access to source code is not required.

"Connected and autonomous vehicles require some of the most complex software ever developed, creating a significant challenge for automakers who must ensure the code complies with industry and manufacturer-specific standards while simultaneously battle-hardening a very large and tempting attack surface for cybercriminals," said BlackBerry executive chairman and chief executive John Chen.

"Jarvis is a game-changer for OEMs because for the first time they have a complete, consistent, and near real-time view into the security posture of a vehicle's entire code base along with the insights and deep learning needed to predict and fix vulnerabilities, ensure compliance, and remain a step ahead of bad actors."

Jarvis users will be able to check their existing software, and review new components before they go into production vehicles.

BlackBerry said "some of the world's largest automakers" are already trialling Jarvis. One of them is Jaguar Land Rover.

"BlackBerry Jarvis addresses the software cybersecurity needs of the automotive industry. In our independent study, Jarvis delivered excellent efficiencies in time-to-market, significantly reducing the time to security assess code from 30 days to seven minutes," said Jaguar Land Rover chief executive Ralf Speth.

"The productivity delivered by Jarvis combined with BlackBerry's trusted security heritage can transform vehicle safety."

Image: Land Rover MENA [CC BY 2.0] via Flickr

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications