Chris Valasek and Charlie Miller: How to Secure Autonomous Vehicles
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Federacy, a member of the Y Combinator Summer 2018 class, has a mission to make bug bounty programs available to even the smallest startup. Traditionally, bug bounty programs from players like BugCrowd and HackerOne have been geared toward larger organizations. While these certainly have their place, founders William and James Sulinski, who happen to be…
A new report on cybercrime shows mid-market companies — 500 to 999 employees — experience greater losses than smaller or larger ones. The report, published by the internet security company Malwarebytes and the market research firm Osterman Research, was based on a survey of 900 security pros — 200 of which worked in the US,…
Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
There are many, many tech startups tackling the problem of diabetes. You only have to look at the TechCrunch tag to find some of the latest, and even the Apple Watch is getting in on the act. But literally ‘reversing’ Type 2 diabetes remains a tough nut to crack. That’s not prevented UK startup OurPath…
The final nail in BitConnect’s coffin will come September 10, when the last exchange to offer trading pairs in the controversial cryptocurrency will delist its worthless token, BCC. For the uninitiated – BitConnect was both a pyramid and Ponzi scheme masquerading as a cryptocurrency lending platform. The more money you invested, the more dividends you were…
Vulnerabilities in healthcare devices and hospital systems are leading to growing concerns in the infosec community about patient safety.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
If you’re looking for hints that Apple might deliver on its long-rumored plan to develop its own car, a significant one landed this week after it emerged that Doug Field — Apple’s former VP of Mac hardware engineering — has rejoined from the company after a spell with Tesla. John Gruber at Daring Fireball broke…
A series of embarrassing gaffes in Cupertino are leading many to question whether Apple has lost its eye for detail. Just weeks after Apple acknowledged, then patched, a throttling issue in its updated line of “Pro-level” laptops, users are now reporting another problem that casts Apple‘s quality control in a less-than-favorable light: the speakers. Numerous…
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea