NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out
LastWatchdog.com | “The tectonic shift of network security is gaining momentum, yet this transformation continues to lag far behind the accelerating pace of change in the operating environment. … I first tapped Gunter Ollmann’s insights about botnets and evolving malware some 20 years when he was a VP Research at Damballa and I was covering Microsoft for USA TODAY.”
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech
WIRED | Check out this recent piece featuring commentary from IOActive Principal Security Consultant, Josep Pi Rodriguez. “Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal cars in seconds. But researchers found Teslas equipped with it are as vulnerable as ever.”
Researcher Strips ROM for Binary Code
Bank Info Security | “One bastion against multifactor authentication hacks has been the security key. A physical device outdoes other methods such as one-time codes – which hackers can intercept – and safeguards against machine-in-the-middle attacks.”
IOActive finds hackers have compromised some game controllers
GamesBeat | “The makers of official licensed game controllers were once pretty good at stopping the clone makers from creating fake controllers. But security research firm IOActive has found that this may not be the case anymore.”
Gone in (less than) 60 Seconds: How My Mercedes was Hacked and Stolen While My Family Slept
Assured Intel | A month ago, my car was hacked and stolen in the middle of the night. So, for the first (and hopefully last) time, I’m the subject of my own article.