Millions of Vehicles at Risk: API Vulnerabilities Uncovered in 16 Major Car Brands

Car Hacking

Multiple bugs affecting millions of vehicles from 16 different manufacturers could be abused to unlock, start, and track cars, plus impact the privacy of car owners.

The security vulnerabilities were found in the automotive APIs powering Acura, BMW, Ferrari, Ford, Genesis, Honda, Hyundai, Infiniti, Jaguar, Kia, Land Rover, Mercedes-Benz, Nissan, Porsche, Rolls Royce, Toyota as well as in software from Reviver, SiriusXM, and Spireon.

Continue reading

Ransomware cuts 1,000 ships off from on-shore servers • The Register

A Norwegian maritime risk management business is getting a lesson in that very area, after a ransomware attack forced its ShipManager software offline and left 1,000 ships without a connection to on-shore servers. 

DNV said the attack happened on January 7, and updated its report yesterday to say it involved ransomware – but affected vessels are not in any danger and can still operate normally, it added. 

Continue reading

New Tesla Key Card Vulnerability Lets Hackers Silently Steal Your Ride – Review Geek

It’s no secret that Tesla has endured its share of potential problems regarding hackers accessing vehicles. However, a new report out of Austria shows a big vulnerability with Tesla’s NFC key cards that could let a hacker add a new card, then steal your car.

Continue reading

Log4j: Just How Screwed Are We?

A vulnerability in a widely used Apache library has caused Internet-wide chaos—and the trouble may just be starting.

Well, it’s certainly been a year for cyber debacles, so, sure, why not tie things off with a nice, fat security vulnerability that affects almost everything on the internet? That sounds about right.

Continue reading

Hacking Humans: 5 Ways You Can Be Exploited on Social Media

If you have an active social media account on any platform, you’ve probably shared some private information, made some friends, or clicked a link that you came across while using it. Undoubtedly, social media platforms can prove to be useful to make connections and reach out to the wider world, but is it always the case?

Continue reading

Windows 10’s Security Falls Apart When You Plug In a Razer Mouse or Keyboard – Review Geek

This is some boolshyt…. how they not know this before putting it out to the public???

Some Windows exploits require computing expertise, dedication to craft, and a ton of free time. But everyone who went to hacker bootcamp should have focused on gaming instead, because it turns out that all you need to gain local admin access on a Windows 10 PC is a Razer mouse or keyboard.

Continue reading

Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Digital illustration of the Guy Fawkes mask.

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

In 2019, the United States Justice Department filed charges against Russian national Maksim Yakubets, offering a $5 million reward for information leading to his arrest.

Continue reading

Anonymous Claims to Leak Data on the Texas GOP

Members of the hacker collective Anonymous claim to have leaked a large cache of data belonging to the Republican Party of Texas. The leak, the size of which is unclear, is said to include the “private documents” of the organization.

According to the hackers, those documents are part of the trove of data that was recently stolen from Epik, the controversial web registrar that has often been criticized for its hosting of far-right groups and individuals.

Continue reading

Signal’s CEO Just Hacked the Cops’ Favorite Phone Cracking Tool


Israeli digital intelligence firm Cellebrite sells software designed to unlock phones and extract their data. As a result, its products are a favorite of law enforcement agencies across the U.S., and police frequently use them to gather evidence from seized devices. In the past, the company has received criticism for its willingness to sell to pretty much any government—including repressive regimes around the world. However, despite its mission to compromise phone security everywhere, Cellebrite would appear to have little interest in securing its own software—if you believe the CEO of encrypted chat app Signal.

Continue reading