Easier with a crowbar: hacking IoT accessories for cars
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
58 articles
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
How some students are cheating their way to exam success with dark web diplomas and hacked grades.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
When it comes to online accounts, voicemail is a major security hole. Here’s why.
In this edition of the podcast, Jeff and Dave discuss a McDonald’s Monopoly whopper, banning miners, hacking by inmates, and more.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
In this week’s podcast, Jeff and Dave discuss a breach impacting Massachusetts taxpayers, alien hackers, contactless payment fraud, and more.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss a vulnerability in Sonic the Hedgehog, a woman who has a habit of sneaking onto flights and more.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
In the United States, the political season is heating up as the country is prepping for their presidential election for the successor to Barack Obama. The whole process of political
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
We all know what computer hacking scenes in movies look like – the hackers are ultra-cool, super sexy with five monitors and the most colorful hacking tools you’ve ever seein.
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.