(12/08/23) Blog 224 – Ford discloses software vulnerability in the SYNC3 infotainment system
Yesterday I posted news about how security researchers have managed to compromise a Tesla allowing…
(11/08/23) Blog 223 – Tesla:”Want those heated seats, it’s gonna cost” Hackers: “Hold my beer”
A rising trend among luxury car manufacturers is to install all the necessary fixtures and…
(10/08/23) Blog 222 – Bulletproof hosting not so bulletproof after all
<Lolek>Hosted, a domain which provided bulletproof hosting has been seized in an operation involving various…
(09/08/23) Blog 221 – Acoustic side channel attack on keyboards
A paper has been released by three University researchers which looks at side channel attacks…
(08/08/23) Blog 220 – US Hospital network forced offline after cyber attack
16 hospitals and more than 160 other medical facilities across the United States are offline…
(07/08/23) Blog 219 – New privacy tools from Google
Last week, Google announced a number of new privacy tools aimed at allowing users to…
(06/08/23) Blog 218 – Op Venetic – another update
Op Venetic - the multi agency operation which cracked the encrypted phone system - Encrochat…
(05/08/23) Blog 217 – 2022 Top routinely exploited vulnerabilities
A number of the worlds cyber security agencies have released a co-authored cyber security advisory…
(04/08/23) Blog 216 – “We didn’t pay a ransom, we reached a settlement”
The insurance company who work on behalf of the Montclair Township's IT department say that…