The Latest in IT Security

Posts Tagged ‘demo exploit’

Researchers have disclosed two remote keyless system attack methods that can be exploited by thieves to clone entry remotes and unlock millions of cars worldwide. The fact that various functions of a moving car can be hijacked by a hacker with local or remote access is not a secret, but most attacks are not easy […]

Read more ...

Free airline Fast Track for all! Free lunch and booze at luxury airport lounges for all! Duty-free shopping for all! That’s what a fake QR code generating app can get you, according to Przemek Jaroszewski, head of Poland’s Computer Emergency Response Team (CERT). At the Defcon security conference in Las Vegas on Sunday, Jaroszewski presented […]

Read more ...

Last year, two researchers set car owners and legislators into a panic when they demonstrated how to cut the engine of a Jeep on the highway from the comfort of an apartment. This year, they are demonstrating a new attack that allows them to slam on someone else’s breaks or spin their steering wheel. Charlie […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments