Tuesday, March 28, 2023

Hackers Say They Can Access Teslas and Make Them Honk Wildly

Hackers Say They Can Access Teslas and Make Them Honk Wildly

Hackers have discovered a chain of vulnerabilities that could allow them to remotely break into a Tesla, granting control over its infotainment system and letting them to turn off lights, pop the trunk, activate wipers, and even honk the horn, TechCrunch reports .

Tesla owners can breathe easy for the time being, though, because the hackers in question were white hats, or cybersecurity researchers that poke and prod for vulnerabilities in a system so they can be patched out.

logo
Publisher: Futurism
Twitter: @futurism
Reference: (Read more) Visit Source



North Korean hackers turn to 'cloud mining' for crypto to avoid law enforcement scrutiny ...

The use of so-called cloud mining to rent crypto mining processing power appears to be a way for the group to avoid technologies such as mixers, which have come under increased law enforcement scrutiny , according to a report out today from the cybersecurity firm Mandiant, which is part of ...

logo
Publisher: CyberScoop
Date: 2023-03-28T15:08:13 00:00
Author: Tonya Riley
Reference: (Read more) Visit Source



Turning hackers' behavior against them - GCN

Hackers may meet their match thanks to a new program aimed at using cyberpsychology to thwart and dissuade cybercriminals.

Cyberpsychology is the scientific field that integrates human behavior and decision-making into the cyber domain, according to the Intelligence Advanced Research Projects Activity.

logo
Publisher: GCN
Date: 2023-03-27T21:38:41 00:00
Author: Kaitlyn Levinson
Twitter: @gcn
Reference: (Read more) Visit Source



Ethical hackers urged to respond to Computer Misuse Act reform proposals | Computer Weekly

Ethical hackers, security researchers and consultants, and the community at large are being urged to step up and make their voices heard as the government explores a series of proposed changes to the Computer Misuse Act (CMA) of 1990 .

The long-awaited consultation, which has been running since February , is seeking views on a number of legislative changes, including giving new powers to law enforcement agencies and closing existing loopholes that make it easier for malicious actors to get away with misusing purloined data.

Publisher: ComputerWeekly.com
Date: 03/28/2023
Twitter: @computerweekly
Reference: (Read more) Visit Source



No comments:

Post a Comment