It took 24 hours. Slashdot thread. Powered by WPeMatico
Author: infossl
I like this Amtrak security awareness campaign. Especially the use of my term “security theater.” Powered by WPeMatico
Impressive remote hack of the Tesla Model S. Details. Video. The vulnerability has been fixed. Remember, a modern car isn’t an automobile with a computer in it. It’s a computer with four wheels and an engine. Actually, it’s a distributed 20-400-computer system with four wheels and an engine. Powered by WPeMatico
Both are worth reading. Powered by WPeMatico
This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder. Powered by WPeMatico
“Periscope skimmers” are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they’re impossible to notice. They’ve been found in the US. Powered by WPeMatico
I got this video from PZ Myers’s blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards for that session can be determined. The program can be easily parallelized. This analysis can be finished while sessions are still running this would permit the following type of attack: A … Read More “Hacking Bridge-Hand Generation Software” »
Research paper: “Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” by Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trapper, Ivan Seskar: Abstract: Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, … Read More “Hacking Wireless Tire-Pressure Monitoring System” »
Remember the San Bernardino killer’s iPhone, and how the FBI maintained that they couldn’t get the encryption key without Apple providing them with a universal backdoor? Many of us computer-security experts said that they were wrong, and there were several possible techniques they could use. One of them was manually removing the flash chip from … Read More “Recovering an iPhone 5c Passcode” »