The legal ramifications of a cyber attack
Guy Betar examines some of the causes for concern with the growing number and size of data breaches.
Guy Betar examines some of the causes for concern with the growing number and size of data breaches.
Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conferences, did not disappoint.
A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.
A week after it was revealed that a Chrysler Jeep could be hacked and remotely controlled, two U.S. senators have called for the National Highway Traffic Safety Administration to investigate potential widespread risk for consumers.
Chrysler has launched a recall of 1.4 million recent model cars that were vulnerable to being remotely accessed and controlled by hackers.