The Tesla Model S is essentially a computer on wheels, and as such, it has become the target of a hacking contest at the SyScan 360 security conference in Beijing. One of the contestants, Qihoo 360 Technology Co. apparently succeeded and were able to take over several of the car’s systems. While the car was in motion, the car’s locks, horn, headlights and skylight were all remotely operated by the contestants.
All data sent via the Internet of Things (IoT) needs to be secured with encryption, according to the findings of recent INQUIRER research.
The research, carried out in conjunction with Intel, revealed that 44 percent of INQUIRER readers believe that data encryption is the best way to ensure the IoT is secure. 23 percent would prefer to see users being given full control over their own data, while 10 percent believe the best IoT security option is to not store any usage data at all.
A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.
Jonathan Zdziarski, a researcher who often trains federal and state law enforcement agencies in forensic techniques, revealed the existence of the mostly hidden features. The data-stealing avenues have evolved over the last few years and may have been used by the U.S. National Security Agency to collect data on potential targets, Zdziarski said.
Scammers are using the MH17 disaster in east Ukraine to spread objectionable links, online security experts have warned.
A link to a pornographic website disguised as a video of the Malaysia Airlines crash was posted on a Facebook page dedicated to one victim.
In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.
In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet.
Way back in 2011, PlayStation Network services and websites went dark due to "an external intrusion." Anonymous claimed responsibility, names, passwords and possible payment information was lost in a data breach, and everybody in general had a bad time.
Intel on Sunday released a batch of new Core i5 and Core i7 Haswell processors for high-end laptops like Apple's MacBook Pro, each boasting the usual speed bumps when compared to prior versions.
The new chip lineup includes three Core i5 and four Core i7 CPUs ranging in clock speed from 2.2GHz to 3.0GHz, reports CPU World. Apple usually launches spec-bumped MacBook Pros twice a year and the latest Intel processors are prime candidates for the next update.
As many as 50,000 websites have been remotely commandeered by attackers exploiting a recently patched vulnerability in a popular plugin for the WordPress content management system, security researchers said Wednesday.
The Associated Press reports that hackers were able to access more than 1,000 StubHub accounts. The hackers were then able to use those accounts to buy tickets from the online reseller. The company claims its own security wasn’t actually compromised. Instead, cyber thieves got their hands on user info through other sites before entering using that same account info on StubHub.
The Chinese city of Yumen in Gansu province in China was sealed off Tuesday for nine days (ending today) after a man died of bubonic plague, South China Post reports, based on a report by China Central Television.
“Other reports said the 38-year-old victim had come across a dead marmot on July 13. He is said to have chopped it up to feed to his dog, but developed a fever the same day.