Researchers have figured out how to hack a Telsa’s key fob in under two seconds. That’s impressive. Remotely. I think in this case remotely means that they do not have to touch the fob or the car, but they have to be pretty damn close to it – in radio range of the fob. Still, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hacking is a moving target. And continues to move. As banks consider using biometric authentication in the place of passwords, hackers are thinking about that too. Researchers at Black Hat demonstrated that they could synthesize your voice well enough to fool personal digital assistants. Already there are products on the market from Adobe, Baidu, Lyrebird, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers have figured out that stealing people’s phone numbers is easier and more profitable than stealing their phone (in part because they don’t have to be anywhere near you or your phone in order to steal the number). Recently I wrote about a bitcoin investor (AKA speculator) who is suing AT&T for $240 million because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Adams County, Wisconsin is now facing a crisis of confidence and likely some lawsuits as well. Why? On March 28, 2018, the county says, it uncovered “questionable activity” on county computer systems. Three months later, in late June, their investigation was complete. The result: 258, 120 people had their data illegally accessed. Data included protected […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since Office 365 is the dominant office productivity suite, knocking Google on it’s butt, it is not a surprise that hackers are going after it hard. To compare, I didn’t find great numbers and Google probably does not want me to do this comparison, but Office has 120 million paid users as of 2017 and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the ongoing saga of IoT security (The score is bad guys: a whole bunch, good guys: not very many), the bad guys continue to win. Researchers analyzed Samsung’s house management hub called SmartThings and found 20 problems. The researchers, part of Cisco, said that the attacks are complex and require the attackers to chain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]