Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee
With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee.
The post Encore Podcast: Chris...
Watch out for these scams targeting Amazon customers
Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on. The post Watch out for these scams targeting Amazon customers appeared first on WeLiveSecurity
As Mobile Fraud Rises, The Password Persists
A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password.
The post As Mobile Fraud Rises, The Password Persists...
CISA Issues Alert on Top Exploited Vulnerabilities
On July 28, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) issued a cybersecurity alert entitled “Top Routinely Exploited Vulnerabilities” in collaboration with the Australian Cyber Security Centre, the United Kingdom’s...
Cybersecurity agencies reveal most exploited vulnerabilities in the past two years
There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet The post Cybersecurity agencies reveal most exploited vulnerabilities in the past two years appeared first on WeLiveSecurity
Apple Issues Patches: Apply Them Now and Alert Your Employees to Do the Same
Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple,...
Proposal for National Transportation Safety Board to Investigate Drone Accidents
Today, the National Transportation Safety Board (NTSB) investigates accidents involving manned aircraft and other major transportation accidents. However, there was a new Notice of Proposed Rule Making (NPRM) released by the...
Tackling the insider threat to the new hybrid workplace
Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose The post Tackling the insider threat to the new hybrid workplace appeared first on WeLiveSecurity
8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more. ...