Tuesday, January 19, 2021
This Bluetooth Attack Can Steal a Tesla Model X in Minutes

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

Wouters notes that the two most serious vulnerabilities he found—the lack of validation for both key fob firmware updates and pairing new key fobs with a car—point to an apparent...
The FBI Says ‘Boogaloo’ Extremists Bought 3D-Printed Machine Gun Parts

The FBI Says ‘Boogaloo’ Extremists Bought 3D-Printed Machine Gun Parts

Adding an auto sear to a semi-automatic AR-15 takes a matter of minutes, says John Sullivan, the director of engineering at Defense Distributed, a DIY gunsmithing and gun access group....
All the Ways Slack Tracks You—and How to Stop It

All the Ways Slack Tracks You—and How to Stop It

The global remote work experiment shows no sign of ending anytime soon. As Europe struggles to contain a deadly second wave of Covid-19, many forward-looking companies have confirmed that...

Google reveals a new Windows zero-day bug it says is under active attack –...

Google has dropped details of a previously undisclosed vulnerability in Windows, which it says hackers are actively exploiting. As a result, Google gave Microsoft just a week to fix...
A Hacker Is Threatening to Leak Patients' Therapy Notes

A Hacker Is Threatening to Leak Patients’ Therapy Notes

Ransomware attacks have surged around the world in recent months, targeting big corporations and critical organizations like hospitals. But digital extortion comes in many forms. And a particularly vicious...

Contrast launches its security observability platform – TechCrunch

Contrast, a developer-centric application security company with customers that include Liberty Mutual Insurance, NTT Data, AXA and Bandwidth, today announced the launch of its security observability platform. The idea here...
A Trickbot Assault Shows US Military Hackers' Growing Reach

A Trickbot Assault Shows US Military Hackers’ Growing Reach

For more than two years, General Paul Nakasone has promised that, under his leadership, United States Cyber Command would "defend forward," finding adversaries and preemptively disrupting their operations. Now...
Amazon's Latest Gimmicks Are Pushing the Limits of Privacy

Amazon’s Latest Gimmicks Are Pushing the Limits of Privacy

There has already been research, though, into attacks that trick vein-based authentication, as well as work on the limitations of fingerprint scanners that assess surface finger features. Researchers have also...

Twitter warns developers that their private keys and account tokens may have been exposed...

Twitter has emailed developers warning of a bug that may have exposed their private app keys and account tokens. In the email, obtained by TechCrunch, the social media giant said...

Edtech funding surges, Poland VC survey, inside Shift’s SPAC plan, more – TechCrunch

I live in San Francisco, but I work an East Coast schedule to get a jump on the news day. So I’d already been at my desk for a couple...

TIPS

HOT NEWS