According to Fiat Chrysler, the remote hijacking flaw was not a "safety defect" under US law.
Microsoft has revised its Bug Bounty schemes with improved rewards, bonuses and the addition of new valid programs.
The $32 radio device, smaller than a cell phone, is designed to defeat the "rolling codes" security used in not only most modern cars and trucks' keyless entry systems, but also in their alarm systems and in modern garage door openers. The post This Hacker’s Tiny Device Unlocks Cars And Opens Garages appeared first on WIRED.
Two hackers figure out how to attack a Tesla Model S, yet also call it "the most secure car that we’ve seen." The post Researchers Hacked a Model S, But Tesla’s Already Released a Patch appeared first on WIRED.
Researchers at Black Hat USA have disclosed critical SCADA/ICS vulnerabilities in switches actively used in industrial control management systems, such as substations, factories, refineries, ports, and other areas of industrial automation.
The group has set up at least 100 watering hole attacks to ensnare victims in the defense, education and political sectors.
Researchers outline how hackers can attack your smartphone to steal your fingerprint on a "large scale" -- without anybody noticing.
Starting Friday, infamous hacker conference DEF CON enters its 23rd year with talks that show you how to fake your death, crack a safe, hack a Tesla, mess with Yubikey, and much more.
The Bunitu Proxy Trojan has moved from malvertising to spreading through virtual private networks to make money for its operators.
Take a plunge into the world of cybersecurity with these recommended reads.
The open-source app is available to download for free.
If the complaint is certified as a class action, it could snowball into a case with more than a million potential plaintiffs. The post Chrysler and Harman Hit With a Class Action Complaint After Jeep Hack appeared first on WIRED.
In an age of 3-D printing, making keys in unusual shapes doesn't offer the security it once did. The post This App Lets Anyone 3-D Print ‘Do-Not-Duplicate’ Keys appeared first on WIRED.
The Terracotta VPN network is made up of compromised Microsoft Windows servers.
The agency is warning local law enforcement of the emerging threat that drones pose.
The latest version of the exploit kit is active and has infected 1.3 million people.
Imagine flying down the road at 20 mph on your electric skateboard when a hacker suddenly jams the breaks and throws you off. The post Hackers Can Seize Control of Electric Skateboards and Toss Riders appeared first on WIRED.
The partnership will expand the use of website isolation techniques to keep the enterprise safe from malware.
A cautionary tale in being patient, and not skipping the line.
Companies need to focus on developing secure coding practices and security education. http://www.informationweek.com/cloud/software-as-a-service/twitter-security-pro-encryption-isnt-enough/d/d-id/1321432I shared my thoughts last week...Show More Summary