The Latest in IT Security

Posts Tagged ‘Cars’

Researchers have disclosed two remote keyless system attack methods that can be exploited by thieves to clone entry remotes and unlock millions of cars worldwide. The fact that various functions of a moving car can be hijacked by a hacker with local or remote access is not a secret, but most attacks are not easy […]

Read more ...

On the heels of the federal government’s warning about automotive cybersecurity vulnerabilities, a group of German vehicle security researchers has released a study showing many wireless key entry systems are vulnerable to hacking.

Read more ...

Are you one of the many people who is using a dangerously easy-to-guess passcode on your iPhone? Maybe you should do something about it – sooner rather than later. The warning comes after new research suggested that 15% of all iPhone owners use one of just ten passwords on their lock screen: Apple iPhone app […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments