UK report blasts Huawei for network security incompetence

The latest report by a UK oversight body set up to evaluation Chinese networking giant Huawei’s approach to security has dialled up pressure on the company, giving a damning assessment of what it describes as “serious and systematic defects” in its software engineering and cyber security competence. Although the report falls short of calling for […]

View More UK report blasts Huawei for network security incompetence

Hackers conquer Tesla’s in-car web browser and win a Model 3

A pair of security researchers dominated Pwn2Own, the annual high-profile hacking contest, taking home $375,000 in prizes including a Tesla Model 3 — their reward for successfully exposing a vulnerability in the electric vehicle’s infotainment system. Tesla handed over its new Model 3 sedan to Pwn2Own this year, the first time a car has been […]

View More Hackers conquer Tesla’s in-car web browser and win a Model 3

Homeland Security warns of critical flaws in Medtronic defibrillators

Homeland Security has issued a warning for a set of critical-rated vulnerabilities in Medtronic defibrillators which put the devices at risk of manipulation. These small implantable cardio-defibrillators are implanted in a patient’s chest to deliver small electrical shocks to prevent irregular or dangerously fast heartbeats, which can prove fatal. Most modern devices come with wireless […]

View More Homeland Security warns of critical flaws in Medtronic defibrillators

Law enforcement needs to protect citizens and their data

Robert Anderson Contributor Robert Anderson served for 21 years in the FBI, retiring as executive assistant director of the Criminal, Cyber, Response and Services Branch. He is currently an advisor at The Chertoff Group and the chief executive of Cyber Defense Labs. Over the past several years, the law enforcement community has grown increasingly concerned […]

View More Law enforcement needs to protect citizens and their data

Donated devices are doxing your data, says new research

In the space of six months, one security researcher found thousands of files from dozens of computers, phones and flash drives — most of which contained personal information. All the researcher did was scour the second-hand stores for donated and refurbished tech. New research published by security firm Rapid7 revealed how problematic discarded technology can […]

View More Donated devices are doxing your data, says new research

The responsibility for a sustainable digital future

Mounir Mahjoubi Contributor Share on Twitter Mounir Mahjoubi is the French Secretary of State for Digital Affairs. On March 12, 2019, we celebrate the 30th anniversary of the “World Wide Web”, Tim Berners-Lee’s ground-breaking invention. In just thirty years, this flagship application of the Internet has forever changed our lives, our habits, our way of […]

View More The responsibility for a sustainable digital future

Car alarms with security flaws put 3 million vehicles at risk of hijack

Two popular car alarm systems have fixed security vulnerabilities that allowed researchers to remotely track, hijack and take control of vehicles with the alarms installed. The systems, built by Russian alarm maker Pandora and California-based Viper — or Clifford in the U.K., were vulnerable to an easily manipulated server-side API, according to researchers at Pen […]

View More Car alarms with security flaws put 3 million vehicles at risk of hijack

Homeland Security hasn’t done enough to protect election infrastructure, says watchdog

Homeland Security could do more to protect election infrastructure ahead, according to a new report by the department’s watchdog. The report from the inspector general, out Wednesday, said progress had been made but Homeland Security, the department charged with protecting elections and the back-end voting machine infrastructure, still “does not have dedicated staff” focused on […]

View More Homeland Security hasn’t done enough to protect election infrastructure, says watchdog

Huawei opens a cybersecurity transparency center in the heart of Europe

5G kit maker Huawei opened a Cyber Security Transparency center in Brussels yesterday as the Chinese tech giant continues to try to neutralize suspicion in Western markets that its networking gear could be used for espionage by the Chinese state. Huawei announced its plan to open a European transparency center last year but giving a […]

View More Huawei opens a cybersecurity transparency center in the heart of Europe

Flawed visitor check-in systems let anyone steal guest logs and sneak into buildings

Security researchers at IBM have found, reported and disclosed 19 vulnerabilities in five popular visitor management systems, which they say can be used to steal data on visitors — or even sneak into sensitive and off-limit areas of office buildings. You’ve probably seen one of these visitor check-in systems before: they’re often found in lobbies […]

View More Flawed visitor check-in systems let anyone steal guest logs and sneak into buildings

Researchers obtain a command server used by North Korean hacker group

In a rare move, government officials have handed security researchers a seized server believed to be used by North Korean hackers to launch dozens of targeted attacks last year. Known as Operation Sharpshooter, the server was used to deliver a malware campaign targeting governments, telecoms, and defense contractors — first uncovered in December. The hackers sent […]

View More Researchers obtain a command server used by North Korean hacker group

Thailand passes controversial cybersecurity law that could enable government surveillance

Thailand’s government passed a controversial cybersecurity bill today that has been criticized for vagueness and the potential to enable sweeping access internet user data. The bill (available in Thai) was amended late last year following criticism over potential data access, but it passed the country’s parliament with 133 positives votes and no rejections although there […]

View More Thailand passes controversial cybersecurity law that could enable government surveillance