Post Thumbnail

Having outgrown the odiferous corridors of the Rio, hacker conference Def Con entered this year by relocating to Bally's Hotel and Casino -- a venue described to me, in turns, by a Mandalay Bay hairdresser as "a shithole," a taxi driver as "a punishment" and a Mandarin Hotel bar waitress as "total...

August 14th 2015 at 5:10pm 0 Comments
Post Thumbnail

Immobilizers are supposed to kill a vehicle's engine to prevent it from being stolen. However, a trio of researchers recently released a study that reveals the Megamos immobilizer system used by more than two dozen car manufacturers -- including Volkswagen, Porsche and Honda -- can be cracked with...

August 14th 2015 at 1:44pm 0 Comments
Post Thumbnail

Last month security researcher Samy Kamkar announced a vulnerability that allowed him to remotely unlock OnStar-enabled GM cars. While that issue has been fixed, it looks like the same vulnerability found in OnStar is also present in BMW Remote, Mercedes' mbrace and Chrysler's Uconnect. Kamkar tol...

August 13th 2015 at 6:36pm 0 Comments
Post Thumbnail

In a ballroom in Bally's Vegas casino, kids are lined up on either side of a table with soldering guns melting metal to metal. Their small hands deftly join LED to circuit board, while a few feet away other children are learning the basics of developing. In the back of the room, a group of childre...

August 13th 2015 at 3:15pm 0 Comments
Post Thumbnail

The Stagefright vulnerability for Android won't seem to want to go away. According to Exodus Intelligence researchers one of the patched issued by Google could still allow access to Android devices. The researchers told Engadget via email, "the summary is that the Stagefright vulnerability is stil...

August 13th 2015 at 2:52pm 0 Comments
Post Thumbnail

If you're so concerned about the security of your Dropbox account that even two-factor authentication through your phone seems too risky, you can rest easy. The cloud storage outfit has added support for USB keys as part of the two-factor sign-in process. Rather than punch in a code, you just pl...

August 12th 2015 at 3:51pm 0 Comments
Post Thumbnail

Samsung isn't the only Windows PC maker to have hijacked Windows' update process as of late. Users have noticed that some Lenovo PCs running Windows 7 and 8 (such as the Yoga 3) had firmware that automatically downloaded and installed Lenovo's own update software on boot, overwriting a Windows sys...

August 12th 2015 at 11:11am 0 Comments
Post Thumbnail

The phrase I saw and heard over and over again while talking to other journalists and security researchers about the Def Con hacker convention was "hostile environment." Not physically hostile; the attendees and staff were extremely nice. The hostility was digital. The hackers and security researc...

August 11th 2015 at 5:34pm 0 Comments
Post Thumbnail

It's not only Chrysler drivers that have to worry about hackers taking control of their cars from afar. UC San Diego researchers have found that you can control features on cars of many makes by exploiting vulnerabilities in cellular-capable dongles that are sometimes plugged into the vehicles' O...

August 11th 2015 at 12:56pm 0 Comments
Post Thumbnail

Just because you mark some of your Facebook data as private doesn't mean that you're hard to track down. Software engineer Reza Moaiandin has learned that it's possible to scoop up the public details of legions of Facebook users simply by guessing phone numbers with a random number generator. You...

August 10th 2015 at 5:21pm 0 Comments
Post Thumbnail

You probably don't think about thieves when you unlock your car, but Samy Kamkar certainly does. The security researcher known for his droll (and scary) hacks has created a device called "Rolljam" that cracks the wireless entry systems used by car- and garage-door makers. He demonstrated it at Def...

August 10th 2015 at 3:22am 0 Comments
Post Thumbnail

If you have an old, Intel-based computer hanging around, you might want to get rid of it post-haste. Security researcher Chris Domas has discovered a vulnerability in the x86 architecture of Intel processors made between 1997 and 2010 (pre-Sandy Bridge) that lets an attacker install software in a...

August 8th 2015 at 10:11pm 0 Comments