Reports

Connected Car

Hackers Remotely Steer Tesla Model S Using Autopilot System

Security researchers managed to take remote control of the Autopilot feature of Tesla Model S car using a wireless gaming keypad, highlighting the potential security issues with next-generation automobiles’ Advanced Driver Assistance Systems (ADAS) that are meant to enhance driver safety.

Theophilus Brown Patent for a Manure Spreaders

Opinion: my Grandfather’s John Deere would support our Right to Repair

Willie Cade’s grandfather, Theo, an engineer at John Deere, helped invent the manure spreader. His grandson thinks John Deere’s efforts to kill right to repair legislation is what stinks.

Internet Explorer

Report: with most exploited vuln of 2018, it’s really Really REALLY time to ditch IE!

Microsoft’s products are still a leading source of exploitable security vulnerabilities used by hackers, according to a report by the firm Recorded Future.

Report: China, Like Russia, Uses Social Media to Sway U.S. Public Opinion

Russia isn’t the only nation using social media sites like Facebook, Twitter and Instagram to spread its political message across in the United States; China also is using social media–albeit in different ways–to sway public opinion and make the Communist country look favorable to the American public, research has found. China’s state-sponsored media is using English-language social-media operations–including targeted advertisements on Facebook–to push positive propaganda about the country to American users, according to a new assessment from security intelligence firm Recorded Future. It’s already well known that Russia has used U.S. social media to sway not just public opinion but also results in the 2006 U.S. presidential election. Now the research takes a deeper dive into how China is doing something similar, although to support a different political agenda, according to a blog post outlining the findings by Recorded Future’s Insikt Group. “These differences in technique are driven by dissimilar […]

Research: Sextortion Scams more frequent, sophisticated

So-called “sextortion” attacks are a growing threat, replacing other e-mail borne threats like spam, ransomware and business e-mail compromise attacks as they increase in sophistication and scope, a new report finds.