All Blogs / Technology / Security / Popular


Regulators left in dark over Chrysler security flaw for 18 months

According to Fiat Chrysler, the remote hijacking flaw was not a "safety defect" under US law.

Microsoft raises the bar for Bug Bounty programs

Microsoft has revised its Bug Bounty schemes with improved rewards, bonuses and the addition of new valid programs.

This Hacker’s Tiny Device Unlocks Cars And Opens Garages

The $32 radio device, smaller than a cell phone, is designed to defeat the "rolling codes" security used in not only most modern cars and trucks' keyless entry systems, but also in their alarm systems and in modern garage door openers. The post This Hacker’s Tiny Device Unlocks Cars And Opens Garages appeared first on WIRED.

Researchers Hacked a Model S, But Tesla’s Already Released a Patch

Two hackers figure out how to attack a Tesla Model S, yet also call it "the most secure car that we’ve seen." The post Researchers Hacked a Model S, But Tesla’s Already Released a Patch appeared first on WIRED.

Nuclear nightmare: Industrial control switches need fixing, now

Researchers at Black Hat USA have disclosed critical SCADA/ICS vulnerabilities in switches actively used in industrial control management systems, such as substations, factories, refineries, ports, and other areas of industrial automation.

Chinese hackers lay cybersnares for US, UK firms

The group has set up at least 100 watering hole attacks to ensnare victims in the defense, education and political sectors.

Hackers can remotely steal fingerprints from Android phones

Researchers outline how hackers can attack your smartphone to steal your fingerprint on a "large scale" -- without anybody noticing.

Death certificates, safes, weapons and Teslas: DEF CON 23

Starting Friday, infamous hacker conference DEF CON enters its 23rd year with talks that show you how to fake your death, crack a safe, hack a Tesla, mess with Yubikey, and much more.

Bunitu Trojan botnet supports commercial VPN infrastructure

The Bunitu Proxy Trojan has moved from malvertising to spreading through virtual private networks to make money for its operators.

Cybersecurity reads which belong on every bookshelf

Take a plunge into the world of cybersecurity with these recommended reads.

Chrysler and Harman Hit With a Class Action Complaint After Jeep Hack

If the complaint is certified as a class action, it could snowball into a case with more than a million potential plaintiffs. The post Chrysler and Harman Hit With a Class Action Complaint After Jeep Hack appeared first on WIRED.

This App Lets Anyone 3-D Print ‘Do-Not-Duplicate’ Keys

In an age of 3-D printing, making keys in unusual shapes doesn't offer the security it once did. The post This App Lets Anyone 3-D Print ‘Do-Not-Duplicate’ Keys appeared first on WIRED.

Chinese hackers hijack commercial VPN service to launch cyberattacks

The Terracotta VPN network is made up of compromised Microsoft Windows servers.

Homeland Security warns drones could be used as weapons

The agency is warning local law enforcement of the emerging threat that drones pose.

RIG exploit kit crimewave infects millions

The latest version of the exploit kit is active and has infected 1.3 million people.

Hackers Can Seize Control of Electric Skateboards and Toss Riders

Imagine flying down the road at 20 mph on your electric skateboard when a hacker suddenly jams the breaks and throws you off. The post Hackers Can Seize Control of Electric Skateboards and Toss Riders appeared first on WIRED.

Menlo Security partners with Webroot in enterprise malware screening push

The partnership will expand the use of website isolation techniques to keep the enterprise safe from malware.

New Windows 10 scam will encrypt your files for ransom

A cautionary tale in being patient, and not skipping the line.

Encryption Isn't Enough

Companies need to focus on developing secure coding practices and security education. http://www.informationweek.com/cloud/software-as-a-service/twitter-security-pro-encryption-isnt-enough/d/d-id/1321432I shared my thoughts last week...Show More Summary

Copyright © 2015 Regator, LLC