There is an unpatchable vulnerability that affects most modern cars. It’s buried in the Controller Area Network (CAN): Researchers say this flaw is not a vulnerability in the classic meaning of the word. This is because the flaw is more of a CAN standard design choice that makes it unpatchable. Patching the issue means changing … Read More “Unfixable Automobile Computer Security Vulnerability” »
The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus brief from a wide array of security technologists outlining the technical arguments as why the answer should be yes. Susan Landau summarized our arguments. … Read More “Do the Police Need a Search Warrant to Access Cell Phone Location Data?” »
One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets — or misinterprets — in a particular way, you can trick the computer into doing things that it wasn’t intended to do. This is basically what a … Read More “Hacking a Gene Sequencer by Encoding Malware in a DNA Strand” »
This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she’s behind bullet-proof glass. But then the robber threatens one of her co-workers, who is on his side of the glass. Interesting example of a security system failing for an unexpected reason. The video is … Read More “Bank Robbery Tactic” »
Details on how a squid’s eye corrects for underwater distortion: Spherical lenses, like the squids’, usually can’t focus the incoming light to one point as it passes through the curved surface, which causes an unclear image. The only way to correct this is by bending each ray of light differently as it falls on each … Read More “Friday Squid Blogging: Squid Eyeballs” »
I seem to have a LinkedIn account. This comes as a surprise, since I don’t have a LinkedIn account, and have never logged in to LinkedIn. Does anyone have any contacts into the company? I would like to report this fraudulent account, and possibly get control of it. I’m not on LinkedIn, but the best … Read More “I Seem to Have a LinkedIn Account” »
Researchers found that they could confuse the road sign detection algorithms of self-driving cars by adding stickers to the signs on the road. They could, for example, cause a car to think that a stop sign is a 45 mph speed limit sign. The changes are subtle, though — look at the photo from the … Read More “Confusing Self-Driving Cars by Altering Road Signs” »
For once, the real story isn’t as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote controller, but: The technique requires gaining physical access to the target Echo, and it works only on devices sold before 2017. But … Read More “Turning an Amazon Echo into an Eavesdropping Device” »
Interesting story about Uber drivers who have figured out how to game the company’s algorithms to cause surge pricing: According to the study. drivers manipulate Uber’s algorithm by logging out of the app at the same time, making it think that there is a shortage of cars. […] The study said drivers have been coordinating … Read More “Uber Drivers Hacking the System to Cause Surge Pricing” »
Interesting story: The venture is built on Alex’s talent for reverse engineering the algorithms — known as pseudorandom number generators, or PRNGs — that govern how slot machine games behave. Armed with this knowledge, he can predict when certain games are likeliest to spit out moneyÂinsight that he shares with a legion of field agents … Read More “Hacking Slot Machines by Reverse-Engineering the Random Number Generators” »