If car theft seems like a low-tech crime to you, you’re forgetting the extent to which computers are now standard car parts. Computer control of automobiles makes some cool features possible, but one of those features may be that thieves can start a vehicle using a portable computer. How? Police in Houston, where a culprit was caught on camera, aren’t actually sure how they did it. [More]
Earlier today, a bipartisan group of senators introduced legislation intended to combat new rules that some critics believe gives expanded hacking authority to federal law enforcement agencies. In response, the Justice Department claims that this bill isn’t necessary to protect consumers’ privacy. [More]
A group of Senators has announced today that they are introducing a new bill into the Senate designed to prevent mass hacking of Americans’ digital devices. But the lawmakers aren’t targeting shadowy collectives or foreign nationals with their proposed legislation; they’re seeking to limit the scope of actual Federal agencies’ powers.
Copyright Office Rules: Yes, Security Researchers May Hack Cars (And A Couple Other Things) For Science
Copyright law is surprisingly pervasive. It affects everything from computers to cars (and tractors). The law says you’re not allowed to circumvent DRM on anything for any reason… except for a big pile of things you actually legally can. Those exemptions get re-evaluated every three years, and today the new list is out.
While it might be super convenient to have everything in your home connected to the Internet, that interconnectivity can also give attackers a chance to sneak in through seemingly innocent devices. Take the humble tea kettle: a security researcher in England has been hacking into smart kettles across the country and gaining access to private WiFi networks.
Jeep Cherokee Owners File Lawsuit Against Fiat Chrysler, Harman After Hackers Wirelessly Hijack Vehicle
It was inevitable: A few weeks after hackers showed that a Jeep Cherokee could be hijacked remotely, three car owners have filed a lawsuit seeking class-action status against Fiat Chrylser Automobiles and Harman International, the maker of the Uconnect onboard infotainment system.
After a journalist’s report of being inside a 2014 Jeep Cherokee while hackers miles away took over his car as part of an experiment, Fiat Chrysler has announced it’s offering a software patch for some of its internet-connected vehicles. That being said, the company didn’t directly acknowledge the hacking event itself.
It sounds like a nightmare: You’re driving along, maybe whistling along to the radio, when suddenly the music changes and starts blasting, the car begins honking and won’t stop and the transmission cuts out. Nightmarish though that may sound, it could be a reality for drivers, after a team of hackers showed they’re able to get control of a vehicle from miles away.
A week after a government report identified security weaknesses within the airline industry including the possibility that newer airplanes with interconnected WiFi systems could be hacked, the Federal Bureau of Investigation and Transportation Security Administration issued an alert warning airlines to be vigilant about monitoring for such threats. [More]
Some of the world’s banks likely had a crummy Valentine’s Day after a new report from a computer-security firm came out this weekend, saying that a group of criminals has stolen millions of dollars since late 2013 from financial institutions in Russia, Eastern Europe and the United States. And it doesn’t seem like they’re done yet.
Someone — or, as it turns out, a number of someones — might be the proud new owner(s) of a couple books, a bottle of wine and another of bourbon and oh yeah, around $20,000 in cash after a hacker group claims to have beaten Apple’s new fingerprint scanner, Touch ID. This, just a few days after the iPhone 5S descended on the public. [More]
After his Xbox Live account was stolen, Josh had to file a Better Business Bureau complaint in order to make MIcrosoft pay attention to him and restore his account access. After three months, he was delighted to log back in to his account, but surprised to learn that he had been banned for a “code of conduct violation.” What did his account do to get banned? It was trying to steal other accounts. Imagine that.
Researchers have proposed a new method for detecting trojan viruses embedded into hardware chips by using voltage detectors that “sing out” in a different frequency when they’re used on a tampered circuit.
A certain Scarlett Johansson photo you may have read about but certainly didn’t check out yourself is part of a federal investigation that resulted in the arrest of a 35-year-old Florida man who is accused of hacking into online accounts of various celebrities.
Good firewalls make good neighbors, but they won’t stop a determined hacker from busting through and manipulating your cyber footprints. For proof, look at the Minnesota man convicted of hacking his neighbor’s WiFi and attempting to frame him for child pornography and other crimes will serve 18 years in prison.