Tesla Model S Hack

from Schneier on Security Impressive remote hack of the Tesla Model S.  Details. Video. The vulnerability has been fixed. Remember, a modern car isn’t an automobile with a computer in it. It’s a computer with four wheels and an engine. Actually, it’s a distributed 20-400-computer system with four wheels and an engine. More here.

Continue reading

Why You Should Put a Post-It Over Your Laptop Camera

from Note to Self How much would it take for someone to hack your life? And really, how worried do you actually need to be? For most of us, this question stays in the realm of the hypothetical. For others, it only turns into a question after the worst has happened. For tech journalist Kevin Roose, co-host of Fusion’s new documentary series Real Future, it was a chance to be the human embodiment of a Fortune 500 company. On this week’s Note to Self, hear what happened when Roose asked some of the best hackers in the world to put him through a […]

Continue reading

Apple’s Security Debate is Everyone’s Problem (Including Yours)

from Note to Self The debate over whether the government can access your phone is here. Hello! You’ve probably been following along, but in case you need the tl;dr: The debate revved up last month when the FBI asked Apple to hack into a locked iPhone associated with one of the gunmen from the San Bernardino massacre last December. Since then, the conversation has evolved into a national debate over what the government should (and shouldn’t) be allowed to access. The conversation has officially moved outside the realm of tech and the government. With 90 percent of American adults owning a cell phone, the issue is hitting a […]

Continue reading

Phone And Laptop Encryption Guide: Protect Your Stuff And Yourself

from ars technica The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg. Using strong PINs or passwords and various Find My Phone features is a good place to start if you’d like to limit the amount of cleanup you […]

Continue reading

Your BMW or Benz Could Also Be Vulnerable to That GM OnStar Hack

from Wired IF YOU THOUGHT your pricey Benz or Bimmer had escaped the rash of recent hacks affecting Chrysler and GM cars, think again.  When security researcher Samy Kamkar revealed a bug in GM’s OnStar service last month that allowed a hacker to hijack its RemoteLink smartphone app, he warned that GM wouldn’t be the only target in an increasingly internet-connected auto industry rife with security flaws. Now Kamkar’s proven himself correct: He’s found that the internet services of three other carmakers suffer from exactly the same security issue, which could allow hackers to unlock vehicles over the internet, track them in some […]

Continue reading

What’s Wrong With Your Pa$$w0rd?

from TED Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That’s a story in itself. It’s secret data worth knowing, especially if your password is 123456 … More here.

Continue reading