Jamie Court reports: The nonprofit, nonpartisan Consumer Watchdog today released a video showing how a box it built with the help of technologists could hack into the wireless connection of a Tesla and take over the screen with a “This Tesla’s Been Hacked” message. The video can be viewed here: https://youtu.be/RgpmJ6OhPns The group said the demonstration…
Category: Commentaries and Analyses
Microsoft urges users to stop using phone-based multi-factor authentication
Catalin Cimpanu reports Microsoft is urging users to abandon telephone-based multi-factor authentication (MFA) solutions like one-time codes sent via SMS and voice calls and instead replace them with newer MFA technologies, like app-based authenticators and security keys. The warning comes from Alex Weinert, Director of Identity Security at Microsoft. For the past year, Weinert has been…
Biden Is Expected to Keep Scrutiny of Tech Front and Center
Cecilia Kang, David McCabe and Jack Nicas report: The tech industry had it easy under President Barack Obama. Regulators brought no major charges, executives rotated in and out of the administration, and efforts to strengthen privacy laws fizzled out. The industry will have it much harder under president-elect Joseph R. Biden Jr. Bipartisan support to…
Senior U.S. cybersecurity official asked to resign amid Trump transition tumult
Christopher Bing reports: A senior U.S. cybersecurity official is leaving government after being asked to resign, an official familiar with the matter said Thursday, part of a wider thinning of President Donald Trump’s administration following Joe Biden’s election win. Bryan Ware, the Assistant Director for Cybersecurity for the Department of Homeland Security’s Cybersecurity and Infrastructure…
“Email Appender” Implants Malicious Emails Directly Into Mailboxes
As if we didn’t have enough breaches that start by compromising an employee’s email account, now there’s more to worry about. Imagine that despite training your employees to be careful, and despite using updated AV or other software to detect nasties, a threat actor could deliver malware-laden emails directly into your employees’ inboxes. Will employees…
PROOF POINTS: What happens when private student information leaks
Drawing upon the incredible work of Doug Levin and his K-12 Cybersecurity Resource Center, Jill Barshay of The Hechinger Report highlights some of Doug’s findings — findings the GAO relied heavily upon in their recent report. How you tabulate breaches can make a huge difference in the public’s — and Congress’s — understanding of the…