Technologies

Drive-By Malware Uses Google Sites for Drive by Download Attacks

New malware, LoadPCBanker, is leveraging Google’s Sites to spread via drive-by download attacks, according to a new report. Companies are advised to block uploads and downloads from the service.

Podcast Episode 142: On Supply Chains Diamond-based Identities are forever

In this week’s episode, #142:  we continue our series on Life after Passwords: the Future of Online Identity as we are joined by Ophir Gaathon, the CEO of the firm Dust Identity.

Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities

Supply chain hacks like ME Docs and ASUS aren’t inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group’s DICE Architectures Working Group* about how strong device identities for IoT endpoints can stop supply chain compromises.

Hackers Remotely Steer Tesla Model S Using Autopilot System

Security researchers managed to take remote control of the Autopilot feature of Tesla Model S car using a wireless gaming keypad, highlighting the potential security issues with next-generation automobiles’ Advanced Driver Assistance Systems (ADAS) that are meant to enhance driver safety.