In this episode of the podcast (#165), we look at the challenges faced by independent security researchers in Canada. We talk with 19 year-old Noah Clements of University of New Brunswick about the blowback he received after reporting a serious hole in a smart doorbell. Also, staff attorney Tamir Israel from the Canadian Internet Policy and Public Interest Clinic (CIPPIC) joins us to talk about the still evolving legal picture for independent security researchers in Canada.
Security researchers managed to take remote control of the Autopilot feature of Tesla Model S car using a wireless gaming keypad, highlighting the potential security issues with next-generation automobiles’ Advanced Driver Assistance Systems (ADAS) that are meant to enhance driver safety.
Microsoft’s products are still a leading source of exploitable security vulnerabilities used by hackers, according to a report by the firm Recorded Future.
Russia isn’t the only nation using social media sites like Facebook, Twitter and Instagram to spread its political message across in the United States; China also is using social media–albeit in different ways–to sway public opinion and make the Communist country look favorable to the American public, research has found. China’s state-sponsored media is using English-language social-media operations–including targeted advertisements on Facebook–to push positive propaganda about the country to American users, according to a new assessment from security intelligence firm Recorded Future. It’s already well known that Russia has used U.S. social media to sway not just public opinion but also results in the 2006 U.S. presidential election. Now the research takes a deeper dive into how China is doing something similar, although to support a different political agenda, according to a blog post outlining the findings by Recorded Future’s Insikt Group. “These differences in technique are driven by dissimilar […]
Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology.