Belgian researchers have demonstrated a 3rd attack on the car manufacturer’s keyless entry system, this time to break into a Model X within just minutes.
Take a break and read all about it
A Turkish hacktivist defaced a subdomain of the President-Elect’s campaign website. A subdomain used by US President-elect Joe Biden’s official campaign website was defaced last
Manchester United FC endured ‘Sophisticated Cyber-Attack by Organised Criminals’ – Press Spokesperson!
Manchester United (MUFC) were the victims of a cyber-attack described as a “sophisticated operation by organised cyber-criminals”, the club has now confirmed. MUFC revealed on Fri.
An increase in recent phishing & Business E-mail Compromise (BEC) attacks can be traced back to criminals learning how to exploit Google Services, according to research
The Christian faith app Pray.com has leaked private data for up to 10m persons, says researchers. Information exposed in a public cloud bucket included PII,
Suspend your incredulity – this is not fake news! We have all heard of circulating stories (true or otherwise) of networks betrayed by a remote
Americold, a company whose cold-storage capabilities are important to the US food-supply chain (& soon, COVID-19 vaccine distribution), has confirmed an operations-impacting cyberattack, according to
Security experts are lauding the recent passing by the US Senate on a ground-breaking internet-of-things (IoT) security regulatory law. They praised the newly approved IoT
The Los Angeles Police Department (LAPD) has banned the use of commercial facial-recognition services – citing “public trust” considerations. The dept. has said ‘no’ to
Trump Fires Director of US Cyber-Security Agency (CISA) that rebuffed Voter Fraud claims! Deputy Resigns in Solidarity!
Donald Trump last night fired the Director of the US Federal Agency that confirmed the reliability of the 2020 Presidential election & pushed back on the
A critical path-traversal flaw (CVE-2020-27130) exists in Cisco Security Manager that opens sensitive information to remote, unauthenticated attackers. A day following proof-of-concept (PoC) exploit code
Attackers can exploit the feature & send people’s data directly to remote servers, posing a privacy & security risk, researchers observed. Security researchers are lambasting