Tesla Hacks
In an earlier post from Black Hat, I discussed how car washes could be hacked. Today, we can remove the “wash” part and simply focus on the car. More specifically,
36 articles
In an earlier post from Black Hat, I discussed how car washes could be hacked. Today, we can remove the “wash” part and simply focus on the car. More specifically,
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
By now, you are no doubt familiar with short-term rental sites — AirBnB, Homeaway, and the like. Many of you reading this have used them, whether as guest or as
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.