Common Vulnerabilities and Exposures number 2017-14937: in unspecified post-2014 passenger car models, the explosive charge that deploys the airbag is controlled by an instruction that is secured by one of only 256 keypairs, and there is no rate-limit on authentication attempts over the CAN bus. It gets better! "In addition, at least one manufacturer's interpretation of the ISO 26021 standard is that it must be possible to calculate the key directly (i.e., the other 255 key pairs must not be used)."
(via Dan Hon)
Security researcher Cian Heasley discovered an unprotected online storage folder accessible via the web that contains all the data that stalkers and snoops took from their victims' devices via a commercial program that steals photos and recordings from their devices.
Medtronic is the most notorious maker of insecure medical implants in America, with a long history of inserting computers into people's bodies with insecure wireless interfaces, toolchains and update paths, and nothing has changed.
But her emails.
If you’re into tech at all, you should definitely consider unleashing your inner tinkerer on a Raspberry Pi board. If you’re intimidated, don’t be. It’s a statistical probability that people half your age have created cooler things than you can imagine with the versatile kit. Not sure where to start? The Complete Raspberry Pi 3B+ […]
Are you super organized? You’re going to love the Genius Pack G4 and its seemingly limitless, well-placed compartments. Not that organized? You’re still going to love this piece of luggage because it’s so well thought out that it practically does the packing for you. We’ve all tried to stuff a piece of carry-on so full […]
Despite government legislation and improving caller ID technology, robocalls and scam artists are rampant on the phone lines – up to 35 billion a year in the US alone. They can be annoying at best and a financial threat at worst, but there’s a way to take security into your own hands. One good example […]