Skip to main content

Security

Hacking a $100K Tesla Model S For Fun and $10K Profit

posted onJuly 15, 2014
by l33tdawg

At the 2014 SyScan 360 Conference, being held July 16th and 17th 2014 at the Beijing Marriott Hotel Northeast in Beijing China. Security professionals and hackers paying $319 to attend the conference will have the opportunity to win $10,000 if they can compromise the security of the Tesla Model S.

While the official rules haven’t been released, one could surmise that this will involve remotely gaining control of the vehicle’s controls or physically via the 17 inch touchscreen in the Tesla.

Still Mad at Target, Others? Before You Boycott, Consider the Human Factor of Data Security

posted onJuly 15, 2014
by l33tdawg

Data breaches are scary. No one wants to deal with the ramifications of having their personal information in criminal hands. The recent string of high-profile retail breaches brings the issue home to everyday consumers. Who can you trust with your credit card and other data?

Why password managers are not as secure as you think

posted onJuly 15, 2014
by l33tdawg

University researchers have raised concerns about the security of web-based password managers that free people from the burden of having to remember website credentials.

Scientists at the University of California, Berkeley, studied five password managers and found vulnerabilities in diverse features like one-time passwords, shared passwords and "bookmarklets," which are used to sign into websites on mobile browsers.

4G 'inherently less secure' than 3G

posted onJuly 11, 2014
by l33tdawg

The UK will soon become the third largest 4G market in Europe, with nearly 8 million people connected, but with growing 4G adoption there are greater risks to privacy and personal data than ever before, experts warn.

A major new threat to mobile users comes from the switch to IP (Internet Protocol), according to security firm Cloudmark. 4G mobile networks are all-IP, whereas 3G networks are a combination of IP and mobile signalling protocols (SS7).

The CISO-centric Information Security Triad

posted onJuly 11, 2014
by l33tdawg

What is the information security triad? Just about everyone knows the answer to this question is CIA – Confidentiality, Integrity, and Availability. Security professionals, service providers, and technology vendors are responsible for these three infosec pillars in one way or another.

CISOs also take part of CIA oversight, but their responsibilities extend beyond confidentiality, integrity, and availability alone. In fact, the CISO role is changing rapidly and becoming so critical that these security executives deserve a cybersecurity triad of their own.

Crypto certificates impersonating Google and Yahoo pose threat to Windows users

posted onJuly 10, 2014
by l33tdawg

People using Internet Explorer and possibly other Windows applications could be at risk of attacks that abuse counterfeit encryption certificates recently discovered masquerading as legitimate credentials for Google, Yahoo and possibly an unlimited number of other Internet properties.

Chinese hackers turned focus to U.S. experts on Iraq - security firm

posted onJuly 8, 2014
by l33tdawg

A sophisticated group of hackers believed to be associated with the Chinese government, who for years targeted U.S experts on Asian geopolitical matters, suddenly began breaching computers of experts on Iraq as the rebellion there escalated, a security firm said on Monday.

CrowdStrike Inc said that the group is one of the most sophisticated of the 30 it tracks in China and that its operations are better hidden than many attributed to military and other government units.