Batteries are used to store energy produced by photocells for when the sun isn’t shining. DoD base Camp Lejeune used Duke to install a battery energy storage system or BESS made by Japanese company Toshiba, but the batteries in the system are Chinese and send data back to China, Researchers have also shown that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why Are the Solar Panels on Your Roof a National Security Problem? It would take some work, but if a hacker got access to the same network as your solar panels (like as a result of, say, an unchanged default WiFi password), then due to vulnerabilities in EG4’s solar inverters, a hacker could intercept data, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Qubic Claims to Control Monero Mining Any blockchain is supposed to be unchangeable. That is unless you control the hashing function. The premise behind all blockchains is that there are a lot of independent hash systems which prevents collusion to change the data. If you can change the block data then it is like a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The program’s director at Lawrence Livermore National Laboratory (LLNL) told Congress today that government funding for a program that hunts for threats on America’s critical infrastructure networks expired on Sunday, shutting down all work on the program. CyberSentry is a public-private partnership, managed by CISA, that looks for malicious activity on IT and operational technology […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am not sure why your car radio seems to always provide a way to hack your car, but it does. Researchers at PCA Cyber Security discovered an attack they are called PerfektBlue. The attack focuses on the BlueSDK framework from OpenSynergy and they found several vulnerabilities. Some of these allow for remote code execution, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you can, you are better off charging at home. Not everyone has that option. Since both the car charging port and the public charger are network interfaces that have to communicate both in and out, they – and you – are at risk. What is the risk? It includes disrupting the charging process, stealing […]
Continue reading →
[DISPLAY_ACURAX_ICONS]