It is very difficult and to hack a Tesla Model S, but it's not impossible. Last week, researchers Kevin Mahaffey and Marc Rogers demonstrated that they were able to remotely unlock the Model S' doors, start the vehicle and drive away. They were also able to issue a "kill" command to a Model S to shut down the vehicle's systems, bringing it to a stop. Then, at this weekend's the DEF CON 23 digital security conference, they showed all in attendance how they did it.
The payments industry, facing the risk of increasingly sophisticated cyber-attacks and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security and prevent breaches.
As recently reported, MasterCard is launching a facial recognition payment service based on “selfies” taken on a smartphone. This new technology features a photo scanner that creates a map of the shopper’s face, which is then translated into a code for confirmation of future payments.
A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.
The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute.
If you're a fan of hacking Microsoft's systems, then the company is going to reward you even more for your efforts.
No, Microsoft isn't masochistic. In actuality, its bug bounty program is designed to help the company address critical vulnerabilities and reward those who tinker with Microsoft's systems and services to find them. The goal, as with so many other bug bounty programs, is to give creative exploiters something for their efforts and to discourage them from releasing the results of their hacking to the larger underground communities and/or general public.
Russian hackers allegedly accessed the Pentagon's Joint Staff unclassified email system, which led the agency to take the service offline for nearly two weeks.
NBC News reported, through anonymous sources, that the “sophisticated cyber intrusion” occurred around July 25 and affected nearly 4,000 military and civilian personnel who work for the Joint Chiefs of Staff. The cyber attack apparently relied on an automated system that could quickly gather large amounts of data and distribute it to thousands of online accounts. The entire process could last only a minute.