IOActive

Site Map  |  Privacy Policy  |  Advisories

About Us

Services

News

IOActive Labs

Contact
IOActive Labs IOBOT! Click to learn more.

 
greybar

News
greybar

2014

July 7 SC Magazine Complacency to blame for undetected data breaches
July 5 CNBC Online 'Internet of things' looms, but is it secure?
July 3 Here & Now ‘Smart’ Homes May Be Vulnerable To Hackers
July 3 Auto Motor und Sport Online Datensicherheit im Auto: Auf dem Weg zum gläsernen Autofahrer
July 1 freenewspos.com Lessons for your lamp: Building the 'smarter' home science and technology
July 1 SecuObs.com CCC Camp 11 iOS application security
July 1 CNBC Online Lessons for your lamp: Building the 'smarter' home
June 30 Program Business  Will Car-Hacking Become the New Carjacking?
June 26 IT Pro
Hack In Paris – Winn Schwartau : « Il faut hacker les nouvelles technologies plus tôt 
June 26 Morningstar.com Will car-hacking become the new carjacking?
June 26 TIME 5 Easy Ways to Hacker-Proof Your Home
June 26 Tech Investor News 5 Easy Ways to Hacker-Proof Your Home
June 26 Epoch Times Hacker und NSA freuen sich über Smartphone und „Smarthome“: Warum Überwachung und Cybersicherheit bald unser ganzes Haus betreffen
June 26 Quilmes Presente Asombroso: un argentino "hackeo" los semáforos de la ciudad de Nueva York
June 26 Lavoz Paranaense demostró que se puede hackear el sistema de tránsito de Nueva York 
June 26 Hub Comunicazione
SICUREZZA/ Allarme semafori, gli hacker possono violarli
June 25 SecurityFocus
SecurityFocus
June 23 Register Traffic lights, fridges and how they've all got it in for us
June 23 NaturalNews.com Hackers begin targeting your home appliances: toilets, ovens, refrigerators and more
June 21 HispanicBusiness.com Top concern of banks: Making sure mobile is secure
June 21 TMCnet.com Making sure mobile is secure [NJBIZ (NJ)]
June 21 IPTV Community Making sure mobile is secure [NJBIZ (NJ)]
June 20 Motor Zeitung Hacker sorgt für Verkehrs-Chaos 
June 20 pkw-steuer.de Hacker sorgt für Verkehrschaos 
June 20 Allrad-News.de Hacker sorgt für Verkehrs-Chaos 
June 20 auto.de Hacker sorgt für Verkehrs-Chaos 
June 20 Haber 5 Tuvaletlerde büyük tehlike!
June 20 motor-exclusive.de Hacker sorgt für Verkehrs-Chaos 
June 20 caravan-news.de Hacker sorgt für Verkehrs-Chaos
June 19 Bursada Bugun
Artık tuvaletleri de hack'liyorlar!
June 18 Türk Time Siz uyurken tuvaletinizin hacker'lar tarafından...
June 18 Havadis Gazetesi (Kibris)
Artık tuvaletleri de hack'liyorlar!
June 18 F5 haber Dikkat tuvaletiniz hacklenebilir!
June 18 Yeni Safak
Tuvaletlerde büyük tehlike!
June 18 Haber Kibris Artık tuvaletleri de hack'liyorlar!
June 18 Ajans 34
Tuvaletlerde çok büyük tehlike!
June 18 Hurriyet Artık tuvaletleri de hack'liyorlar!
June 18 Posta Tuvaletler de hack'lenir! - Posta
June 16 Cronista Digital La inseguridad del futuro: las ‘casas inteligentes’ no son a prueba de hackers
June 16 DenverPost.com Even toilets aren't safe as hackers target connected homes
June 14 TG Daily Don't hook up your toilet to the Internet
June 13 ChannelWorld India Beware the Next Circle of Hell: Unpatchable Systems
June 13 BGR The ultimate nightmare: Researchers learn how to hack connected 'smart home' toilets
June 12 freenewspos.com 'Talking cars' could save thousands of lives
June 12 Aljazeera.net
'Talking cars' could save thousands of lives
June 12 Yahoo! News (UK)
'Talking cars' could save thousands of lives
June 12 Wprost.pl Czy hakerzy przejmą kontrolę nad naszymi toaletami?
June 12 Alex Jones Show Online Even Toilets Aren’t Safe as Hackers Target Home Devices
June 12 Canberra Times Even toilets aren't safe as hackers target connected homes
June 11 The Age Even toilets aren't safe as hackers target connected homes
June 11 Exame Nem banheiros serão seguros de Hackers nas casas conectadas
June 11 City A.M.
How your toilet could be the next hacker victim
June 11 Volksblad Nie eens jou toilet is veilig nie
June 11 Die Burger Online Die Burger : Kuberkrakers: Nie eens jou toilet is veilig nie
June 11 Beeld Beeld : Kuberkrakers: Nie eens jou toilet is veilig nie
June 11 Kompas.com Bahkan, Toilet Pun Tidak Aman dari Serangan "Hacker"....
June 11 Infosecurity Today Smart TVs Represent a Massive and Vulnerable Attack Surface
June 10 Bloomberg Businessweek Even Toilets Aren’t Safe as Hackers Target Home Devices
June 10 SC Magazine Alarm bells ring for Internet of Things after smart TV hack
June 10 Infotechnology.com La electrónica en los autos, nuevo blanco de los piratas informáticos | Comunidad
June 10 New In Street Dark Side to Internet of Things: Hacked Homes and Invasive Ads
June 10 NDTV Gadgets Dark Side to Internet of Things: Hacked Homes and Invasive Ads
June 10 Network World China's unsupported XP machines hold the potential to become a massive botnet army
June 9 Computer Business Review ‘Godzilla Attack’ prank prompts US calls for stronger traffic system
June 9 El Dia Online Asombroso: un argentino "hackeo" los semáforos de la ciudad de Nueva York
June 6 PCMag.com Why OpenSSL Being Patched Again Is Good News
June 6 Bloomberg Businessweek A Day at the Miami Beach Cyberarms Fair
June 6 heraldtribune.com
What if someone else could hack into your home?
June 5 euro2Day.gr Nice car, but cyber hackers may be doing your steering
June 5 FT.com Nice car, but cyber hackers may be doing your steering
June 5 Bits Intruders for the Plugged-In Home, Coming In Through the Internet
June 4 America TeVe  Canal 41  Hacker altera semáforos (video)
June 3 Infobae Un argentino demostró que se puede hackear el sistema de tránsito de Nueva York (video)
June 3 Computerworld.ch Beware the Next Circle of Hell: Unpatchable Systems
June 3 SatMagazine Cyber Threats + Security: Is SATCOM The Next Target? 
June 3 Axortagos Hackers και στα ... φανάρια!\
June 3 Lanueva Un argentino demostró que es fácil hackear los semáforos de Nueva York
June 3 CIO.com Security Risk in Starbucks App a 'Wakeup Call' for Consumers
June 2 SDP Hacker entra al sistema de semáforos de Nueva York
June 2 Sin Mordaza Demostró que se pueden hackear los semáforos
June 2 El Economista Un argentino demostró que los semáforos
June 2 New York Times Intruders for the Plugged-In Home, Coming In Through the Internet
June 2 CSO Beware the next circle of hell: Unpatchable systems
June 2 Economic Times Online Edition Dark side to internet of things: Hacked homes and invasive ads 
June 2 Solid State Technology Hacked Homes and Invasive Ads
June 1 Clarin Online Un argentino demostró que se pueden hackear los semáforos
June 1 CIO.com Leaky Websites Provide Trail of Clues About Corporate Executives
May 30
Slashdot Ask Slashdot: What Inspired You To Start Hacking?
May 30
Help Net Security What inspired you to start hacking?
May 30
Computerword NL Beroepsziekte nummer één onder IT'ers: cynisme
May 30
EnBausa IT-Sicherheit im Smart Home ist oft unzureichend 
May 27
Boorow Watching the Watch Dogs: the ethical hackers protecting our smart cities
May 27
TechRadar.Pro Watching the Watch Dogs: the ethical hackers protecting our smart cities
May 22
The Threat Vector Heartbleed Still Causing Heartburn on Industrial Systems
May 21 theguardian.com Smart or stupid: will our cities of the future be easier to hack? 
May 21
Net Security 交通信号の脆弱性が「ミニミニ大作戦」風のハッキングの可能性を広げる~血 まみれのドアが吹き飛ぶのは構わないが、ラッシュアワーの大混乱は?
May 20 CNN Espanol SATCOM interview with Ruben Santamarta (video)
May 20
Computerworld.pl
Wtorkowy Przegląd Prasy - Computerworld
May 19
Idg.pl Błędy w zabezpieczeniach zagrażają komunikacji satelitarnej
May 18
Barrapunto Las comunicaciones por satélite son vulnerables a los hackers
May 18
Araboo.com Can military's satellite links be hacked
May 18
MDZ Online Los fantasmas que acechan a tus aparatos en casa
May 17
Indian Strategic Studies Attack Of The Super Hackers; Cracking Safes, Picking Locks, And Stealing Data; All In The Name Of Corporate Security
May 17
videowarning.com Debian Security Advisory 2927-1
May 15
Benzinga How To Keep Your Mobile Device Safe
May 16
Geldinstitute Die unsichtbare Bedrohung
May 16
Hub Comunicazione SICUREZZA/ Costruttori e auto vulnerabili ad attachi di hacker
May 15
Venezuelaaldia Internet llega a los aparatos de la casa
May 15 Threatpost The Emerging Threat to Satellite Communications
May 15
Yucatan Living Internet, un basurero
May 15
SecurityFocus
[SECURITY] [DSA 2927-1] libxfont security update
May 15
Terra.com Los fantasmas que acechan a tus aparatos en casa
May 15
Fierce it security Hackers take Ford, Toyota cars for a ride
May 15
ecuavisa.com Los fantasmas que acechan a tus aparatos en casa
May 14
Golem.de Libxfont: Weitere Uralt-Lücken im X-Server entdeckt 
May 14 BBC Online Los fantasmas que acechan a tus aparatos en casa - BBC Mundo
May 14
Security Tracker libXfont Buffer Overflows Let Remote and Local Users Execute Arbitrary Code
May 12
El Mundo Un investigador de León descubre que los sistemas de comunicación por satélite son muy inseguros
May 10
boannews.com 군·항공에 사용되는 위성통신 취약점 ‘심각’
May 9
PetaPixel It's Scary How Easily Photos Can Reveal Things They Weren't Intended To
May 9
SC Magazine Confusion reigns after Bitly data breach
May 8
TN Un argentino demuestra que los semáforos se pueden hackear
May 9
Searchsecurity.de Mobile Security: Sicherheitsbedrohungen jenseits von Malware
May 9
Register Traffic light vulns leave doors wide open to Italian Job-style hacks
May 8
Simply Zesty Hackers control your car.. And there's nothing you can do about it!
May 8
SC Magazine Research firm says satcom terminals wide open to exploits
May 8
freenewspos.com Correlati dal web oggi
May 7
SC Magazine Google and NSA Friends with benefits
May 7
TOM'S HARDWARE GUIDE I semafori del mondo sono un colabrodo ma va tutto bene
May 7
Aplanon Hackers μπορούν να επέμβουν στα φανάρια των δρόμων! (στις ΗΠΑ)
May 6
Andy's Throughts Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars
May 6
ReadWrite BLANK LINE
May 6
ReadWrite 5 Things To Consider Before Wiring Up Your Smart Home
May 5
CTV News Canada  How easy is it to hack into a traffic signal system? (video)
May 5
Security Bloggers Network IoT-Hacking Horror Stories: Screaming at Babies & Jamming the Roads
May 4
Slashdot
Researchers Find Easy To Exploit Bugs In Traffic Control Systems
May 4
Security.nl Hacker bedient verkeerslichten via drone
May 3
AOL.com Hackers Can Tinker With Traffic Lights, Other Road Systems
May 2
AutoGuide.com News  Traffic-Control Systems Can Easily be Hacked
May 2
SC Magazine Heart of darkness
May 1
Help Net Security Researcher says traffic control systems can be hacked
May 1
The Security Ledger Traffic Monitoring Tech Vulnerable To Hacking
May 1
Gizmodo Australia It's Amazingly Easy To Hack Traffic Data And Cause Gridlock Chaos
May 1
siliconrepublic Flaw found in electronic traffic control that allows hacker to control traffic - Enterprise - | siliconrepublic.com
May 1
ITS International ITS International - Traffic control systems ‘vulnerable to hacking’
May 1
Computer Business Review Traffic lights ‘vulnerable to hacking'
May 1
Tech Week Europe Traffic Systems Vulnerable To Hackers Wanting To Cause Road Chaos
May 1
KSTW-TV Online Expert: Hackers Can Manipulate, Monitor Largest US Traffic Control Systems - CBS Seattle
May 1
Ars Technica Hacks on widely used traffic control gear could cause gridlock and chaos
April 30 WJLA-TV Online Government Matters - Apr. 27, 2014
April 30
Mail  Online New York's traffic lights HACKED
April 30
KSTW-TV Online Hackers Can Manipulate, Monitor Largest US Traffic Control Systems « CBS Seattle
April 30
Threatpost Hacking Traffic Systems for Fun and Chaos
April 30
WIRED Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars
April 23
Akamai Infoworld The sky is falling! Hackers target satellites
April 22
TMCnet.com Medical devices at potential risk to cyberattack
April 22
InfoWorld
The sky is falling! Hackers target satellites | Security
April 22
Information Security Спутниковые коммуникации уязвимы для множества видов хакерских атак
April 22
Information Technology News Agency آسیب پذیری در سیستم های ارتباطی ماهواره ای
April 21
MT-Online
Protect Your Assets From Cyber Attack
April 21
ITworldcanada
Satellite communications seen as “wide open” to hackers
April 21
MSN - Argentina Las comunicaciones vía satélite son vulnerables a los hackers
April 21
Yahoo! Noticias en Espanol 
Las comunicaciones vía satélite son vulnerables a los hackers
April 21
Computer Business Review
Satellite communication systems ‘vulnerable’ to hacking
April 19
Arie's World Satellite equipment affected by severe vulnerabilities
April 19
Computerworld Australia Online 
Satellite communication systems rife with security flaws, vulnerable to remote hacks
April 19
ARNnet Online
Satellite communication systems rife with security flaws, vulnerable to remote hacks
April 19
www.totaaltv.nl 
Totaal TV | Satellietcommunicatie makkelijk te hacken
April 19
Computerworld.com Satellite communication systems are rife with security flaws, vulnerable to hackers
April 18
Dawn.com
Satellite telecom vulnerable to hackers
April 18
Physics Today
Variety of military satellite systems vulnerable to attack
April 18
CIO.com
Satellite Communication Systems Rife with Security Flaws, Vulnerable to Remote Hacks 
April 18
Japan Times
Satellite telecoms can be hacked: researchers
April 18
The Tech Journal Researchers Reveal Vulnerabilities In Satellite Communication (SATCOM) Devices
April 18
NDTV Gadgets
'Satellite telecommunications systems vulnerable to hackers'
April 18
Space Daily
Satellite telecom vulnerable to hackers: researchers
April 18
Sensors & Systems 
Top Stories
April 18
The Hacker News
Satellite Communication (SATCOM) Devices Vulnerable to Hackers
April 18
Automatisering Gids Satellietcommunicatie eenvoudige prooi voor hackers
April 18
Special Broadcasting Service Warning over satellites vulnerable to hackers
April 18
PHYS.ORG
Satellite telecom vulnerable to hackers, researchers find
April 17
Bangkok Post
Satellite telecom vulnerable to hackers
April 17
Ars Technica
Mission-critical satellite communications wide open to malicious hacking
April 17
france24.com
Satellite telecom vulnerable to hackers
April 17
Webwereld.nl 
Militaire satellietsystemen kwetsbaar voor hackers
April 17
Citizen.co.za Satellite telecom vulnerable to hackers
April 17
Dark Reading
Satellite Communications Wide Open To Hackers
April 17
Slashdot: IT
The Dismal State of SATCOM Security
April 17
Sensors & Systems 
Crucial Military Satellite Systems are Vulnerable to Hacking, Experts Say
April 17
SC Magazine Researchers uncover critical flaws impacting satellite communications
April 17
theguardian.com Crucial military satellite systems are vulnerable to hacking, experts say | Technology
April 14
The BBC Internet of Things: The ‘ghosts’ that haunt the machine
April 11
The Register
Heartbleed vuln under ACTIVE ATTACK as hackers map soft spots
April 11
Q13 Fox News
Did NSA know about Heartbleed Web bug?
April 9
Q13 Fox News
What  should you do to combat ‘Heartbleed’ hacking bug?
April 9
Computerworld
Spider problems cause Mazda to recall 42,000 cars for software update
April 8
 Forbes
DARPA-Funded Researchers Help You Learn To Hack A Car For A Tenth The Price
April 4
ReadWrite
Why Nest’s Smoke Detector Fail Is Actually A Win For Everyone
April 2
Open Systems Publications
Исследователи: китайские компьютеры с Windows XP могут превратиться в огромную армию ботнетов
April 2
Scientific America
Fact or Fiction?: Your Car Is Hackable
April 1
Tom’s Hardware Italy
Windows XP su milioni di computer cinesi, allarme botnet
April 1
SearchCloudSecurity
Cloud attacks sneak past gap between enterprises and providers
April 1
Network World
China's unsupported XP machines hold the potential to become a massive botnet army
April 1
Computerworld India
China's Unsupported XP Systems Could Become a Massive Botnet Army
April 1
CIO
China's unsupported XP machines hold the potential to become a massive botnet army
April 1
TSNN
How Secure Is Your Event Data?
April 1
SearchSecurity
Mobile security: The battle beyond malware
March 21
Asapress.net
SICUREZZA/ Costruttori e auto vulnerabili ad attachi di hacker
March 20
Auto Motor & Sport Han styr en Toyota Prius med sin laptop: "Alla bilar går att hacka”
March 20
The Guardian Online There are real and present dangers around the Internet of Things
March 19
Motor Blog
Connected Cars | Hacker warnt: Auto-Bauer brauchen mehr IT-Sicherheit
March 19
Auto Motor Und Sport
Jedes Auto lässt sich hacken
March 19
CSO 
Major security flaws threaten satellite communications
March 19
EFY Times
Here Are 10 Former Hackers Who’ve Gone On To Build Awesome Careers!
March 18
MSN Money
Are mobile apps dangerous to your wealth?
March 17
Emergency Management
Hackers Seek to Disrupt Electric Grid through Smart Devices
March 17
Government Technology
Hackers Seek to Disrupt Electric Grid through Smart Devices
March 15
San Francisco Chronicle Hackers seek to disrupt electric grid through 'smart’ devices
March 11
Quotidiano Di Sicilia  Smartphone: il 90% delle app bancarie è ad alta vulnerabilità
March 5
ZDNet
IT security governance: Boards must act
March 5
IT Security Guru The Embarrassment of Professional Insecurity, by Professor John Walker, BCS
March 4
The Security Ledger
SOHOwned: 300K Home Routers Hacked
March 4
EDN
Consumer electronics' code curse: It's only going to get worse
March 1
IEEE Spectrum
App Released by Security Conference Is Insecure
March 1
Social Times
Bitly Responds Quickly to DDoS Attack
February 28
Infosec Institute
Car Hacking: You Cannot Have Safety without Security
February 28
The Inquirer
RSA 2014 security conference app has 'severe vulnerabilities'
February 28
PC Advisor
RSA Conference mobile app has vulnerabilities, researchers say
February 28
TweakTown
Oh the irony, RSA Conference mobile app users exposed
February 28
Network World
RSA Conference mobile app has vulnerabilities, researchers say
February 28
PCWorld
Security conference's own app leaks user info
February 28
CIO
RSA Conference mobile app has vulnerabilities, researchers say
February 28
Techworld
RSA Conference mobile app has vulnerabilities, researchers say
February 28
Computerworld
Mobile app for RSA Conference exposes personal data
February 28
ZDNet .de
Leck in App macht Daten von RSA-Conference-Besuchern öffentlich
February 27
TechWeekEurope
RSA 2014: RSA Conference App Leaks Data On Thousands Of Users
February 27
Threatpost
RSA Conference Mobile Application Marred by Security Vulnerabilities
February 27
Ars Technica
Smartphone app for RSA security conference puts users at risk, researchers say
February 27
SocialTimes
Bitly Responds Quickly to DDoS Attack
February 20
TechCrunch
Hardware Needs To Be Harder To Hack
February 20
HotHardware
Belkin Patches WeMo Home Automation Vulnerabilities
February 20
SC Magazine
Chris Valasek, Director of Security Intelligence, IOActive
February 19
SecurityWeek
IOActive Issues Statement on Belkin Vulnerability Debate
February 19
Fox Business
No App is Hack Proof. Here's How to Stay Safe
February 19
TechWeekEurope
Home Tech Vulnerabilities Could Be Used To Set Houses On Fire
February 19
PC Mag
Can Hackers Hijack Your House? Burn Your Toast?
February 18
CBS Chicago
Cyber-Crime Becoming Top Priority For Federal Law Enforcement
February 18
Heise
Gravierende Sicherheitslücken in Belkins Heimautomation
February 18
CNET News
Belkin WeMo smart home networks in danger of hacks
February 18
Threatpost
Researchers Find Serious Flaws in WeMo Home Automation Devices
February 18
SC Magazine
Belkin WeMo flaws could allow remote control of home electronics
February 18
Slashdot
Oops: Security Holes In Belkin Home Automation Gear
February 18
Krebs on Security
Time to Harden Your Hardware?
February 18
Heise
Gravierende Sicherheitslücken in Belkins Heimautomation
February 18
Ars Technica
Password leak in WeMo devices makes home appliances susceptible to hijacks
February 18
Network World
Half million Belkin WeMo users could be hacked; CERT issues advisory
February 18
Electronista
Security flaw found in Belkin WeMo home automation line
February 17
Auto iDnes
Pro hackování auta na dálku stačí pár součástek za čtyři stovky
February 17
FN Today
안전한 인터넷 사용을 위해서는 SSL로 접속이 중요
February 14
infxm
让汽车更聪明,互联网的下一个战场 智能汽车新“浪潮”
February 14
Roll Sohu
让汽车更聪明,互联网的下一个战场 智能汽车新“浪潮”(图)
February 14
Naked Security
Hackers to demo a $20 iPhone–sized gadget that zombifies cars
February 14
Corriere Economia Digitale
Il 90 per cento delle app bancarie sono vulnerabili
February 14
Tom’s Guide
Bogus Web Certificates Threaten Mobile Users
February 14
IEEE Spectrum 
U.S. Gives Cybersecurity Advice to Critical Infrastructure Operators—But No Rules
February 14
The Register
Thought mobe banking apps were safe from nasties? THINK AGAIN
February 13
Actualidad iPhone
Si piensas que tu iPhone no puede ser hackeado, piénsalo otra vez
February 13
Today
App bancarie a rischio hacker: 9 su 10 non sono sicure
February 13
PC Advisor
Dozens of Rogue Self-signed SSL Certificates Used to Impersonate High-profile Sites
February 13
PC World
Dozens of Rogue Self-signed SSL Certificates Used to Impersonate High-profile Sites
February 13
Threatpost
Certificates Spoofing Google, Facebook, GoDaddy Could Trick Mobile Users
February 13
CIO
Dozens of Rogue Self-signed SSL Certificates Used to Impersonate High-profile Sites
February 13
InfoWorld
Dozens of Rogue Self-signed SSL Certificates Used to Impersonate High-profile Sites
February 12
Robohub
Automation, not domination: How robots will take over our world
February 12
NewsFactor
Ars Technica: In the wild: Phony SSL certificates impersonating Google, Facebook, and iTunes
February 12
Netcraft
Fake SSL certificates deployed across the internet
February 12
Ars Technica
In the wild: Phony SSL certificates impersonating Google, Facebook, and iTunes
February 12
The Guardian
Feeling smug that your iPhone can't be hacked? Not so fast…
February 12
Fox Business
Chip and pin cards: The future in the US?  (VIDEO)
February 11
Threatpost
Detecting Car Hacks
February 11
RedOrbit
Kaspersky Labs Warns Of State–Sponsored Spanish Language Malware
February 10
TICbeat
La “princesa hacker” se incorpora a la automovilística Tesla
February 10
Mashable
The Mask Is Off: Cyber Spy Operation Uncovered After 7 Years
February 8
BlogLive
Hacker inventano un dispositivo in grado di controllare l’automobile
February 8
El Espectador
El oscuro mundo de los ‘hackers'
February 7
VnReview
Hack ô tô chỉ với bảng vi mạch nhỏ bằng bàn tay
February 7
iThome Online
研究人員以20美元打造的電子控制模組駭進汽車系統
February 7
Otomotif
Ancaman Peretas Menyabotase Mobil Makin Nyata!
February 7
iMotor Times
Car Hack Device: Deadly iPhone–Sized $20 Tool Can Take Over Any Car, Shocks Auto Industry [REPORT, VIDEO]
February 7
Banking Technology
Mobile vulnerabilities require banking apps rethink
February 6
ITWeb Africa
Global surveillance in the spotlight at ITWeb Security Summit
February 6
Daily Mail
The gadget that can hack any CAR: Terrifying £12 tool can remotely control headlights, locks, steering and even brakes
February 5
i4U News
This iPhone–Sized Device Can Hack A Car
February 5
Forbes
This iPhone–Sized Device Can Hack A Car, Researchers Plan To Demonstrate
February 5
SC Magazine UK
Exclusive: Bitly hit by DDoS attack
February 3
Alaska Dispatch
To save lives, it's time for our cars to 'talk', US says. Are there risks?
February 3
SearchSecurity
Cyberthreats: Know thy enemy in 2014
February 3
The Christian Science Monitor
To save lives, it's time for our cars to 'talk', US says. Are there risks?
February 2
Cuba debate
Si estamos en ciberguerra, ¿dónde están las ciberarmas?
January 30
Infosecurity Magazine
(ISC)² Announces 2014 Board Members
January 30
Wired
How the NSA, GCHQ and crooks can hack mobile apps
January 30
MIT Technology Review Spain
Si estamos en ciberguerra, ¿dónde están las ciberarmas?
January 30
ITWeb Africa
Security stakes soar
January 29
Naked Security
Spy agencies are slurping personal data from leaky mobile apps
January 27
MIT Technology Review
If This Is Cyberwar, Where Are All the Cyberweapons?
January 24
Times Bulletin Media
EDITORIAL: Protect yourself
January 24
MSN Money
Car hacking: The next big cybercrime?
January 22
Computer Weekly
European experts divided on success of cyber security
January 22
Silicon.fr
Forum International de la Cybersécurité : la sécurité au temps de Snowden
January 22
SC Magazine UK
Cyber security 'failure' could result in next major terrorism attack
January 21
Lemonde Informatique
FIC 2014 : La cybersécurité se cherche un avenir
January 16
Nikkei Technology
【记者博客】“普锐斯”可受黑客攻击的严峻现实
January 15
CIO
10 Ways to Prep for -- and Ace -- a Security Job Interview
January 15
PC Advisor
10 ways to prep for -- and ace -- a security job interview
January 14
iMotor Times
Scientist Hackers Prove How Easy It Is To Take Control Of A Modern Toyota Prius [Video]
January 10
AOL Autos
Expert Explains How He Hacked Two Cars For Research
January 10
SoftPedia
Siemens Praised for Quickly Fixing Vulnerabilities in SCALANCE X-200 Switches
January 9
Security Ledger
Siemens Patches Holes In Industrial Control Switch
January 9
Network World
Hacking cars is 'already a serious problem'
January 9
Threatpost
Siemens Fixes Authentication Bugs in Scalance X–200 Switches
January 9
Digital Journal
IOActive Uncovers Multiple Vulnerabilities in SCALANCE X–200 Switch Family
January 9
Dark Reading
Zero–Day Flaws Found, Patched In Siemens Switches
January 9
Infosecurity Magazine
Two Thirds of Personal Banking Apps Found Full of Vulnerabilities
January 8
CircleID
A Research Finds Banking Apps Leaking Info Through Phones
January 8
Threatpost
Industrial Wireless Gateway Vulnerable to Remote Exploit
January 6
SC Magazine
Google joins with automakers to put Android–connected cars on road
January 6
The Register
Planning to rob a Windows ATM? Ditch the sledgehammer and bring a USB STICK
January 6
Dagbladet
Here is the wastewater system for an entire Irish county
January 6
AOL Autos
Automakers Ask For Extensions On Questions About Cyber Security
January 6
CSO
2014, the year that infosec gets political
January 5
e-Gov
未来汽车与数据安全 谈信息化背后的安全隐忧
January 3
ThreatPost
Probes Against Linksys Backdoor Port Surging
January 3
ChinaByte
未来汽车与数据安全 谈信息化背后的安全隐忧
January 2
SC Magazine UK
ATM hackers tap the power of the USB
January 1
Vice Motherboard
The Privacy Threats of 2014

2013

December 31
Slashdot
X11/X.Org Security In Bad Shape
December 31
Dark Reading
Sticking it to the ATM
December 31
redOrbit
UK Hackers Raid ATMs With USB Sticks, Add-Money Making Malware
December 31
Liputan6.com
Mesin ATM Bank di Eropa Dibobol Hanya Dengan 1 Flashdisk
December 31
Admin Magazin
30c3: Sicherheit bei X.org unter Linux mangelhaft
December 30
Dark Reading
NSA’s TAO
December 30
Vinavu
ஹேக்கர்களை முறியடிக்க முடியுமா ? – வீடியோ
December 30
GongKong
山丽网安:未来汽车与数据安全 谈信息化背后的安全隐忧
December 29
Sur InfoNews
Cómo venderle al cibernauta
December 29
Security Watch
Predictions: Securing, Protecting the Internet of Things
December 27
Dark Reading
 PINs Stolen In Target Breach
December 27
The Tribune
Technology aids credit card thieves
December 26
Dark Reading
Target’s Christmas Data Breach
December 23
Dark Reading
Slide Show: the Coolest Hacks Of 2013
December 17
Zena.cz
Pozor na srdce: Hackeři vám mohou zaútočit i na ně!
December 15
ifanr.com
长得像“阿丁哥”的蒙迪欧成福特首款自动驾驶原型车
December 13
VentureBeat
Ford partners with University of Michigan to develop self–driving cars
December 12
Dagbladet
Denne typen tiltak gjør oss mer sårbare for ondsinnede angrep
December 12
SecurityWeek
Cloud Security Bolstered by Threat Modeling
December 11
CNN Money
Your Hackable House
December 10
EuropaPress.ES
Empresas TIC andaluzas realizan un encuentro de negocios con profesionales de EEUU
December 8
TechHive
Senator wants safeguards against car–hacking
December 7
Automotive News
Car hacking: Remote possibility, looming fear
December 7
Auto Hexun
车载信息系统安全广受关注 美参议院开展调研
December 6
Computerworld Portugal
Senador questiona segurança de automóveis com TIC
December 6
Insurance Journal
Connectivity in Cars Raises Cyber Attack Questions: Senator
December 6
PC Mag
Botnet Swipes Two Million Passwords, Most Of Them Were Really Bad
December 6
EFY Times
15 Hacking Tools Seen At The Black Hat Conference In 2013
December 5
Yahoo News
Senator Wants Cybersecurity Answers from Automakers
December 5
Computerworld
Sen. Markey wants to know: Can your car be hacked?
December 5
Claims Journal
U.S. Senator Seeks Information on Carmaker Efforts to Thwart Hackers
December 5
Tom's Guide
Senator Wants Cybersecurity Answers from Automakers
December 5
WCPO
Hackers find weaknesses in car computer systems
December 4
Stuff NZ
Carmakers grilled over hacking
December 4
Independent Online SA
US getting paranoid about car hacking
December 4
Forbes
Here's The Letter A Senator Sent To 20 Auto Makers Demanding Answers On Car Hacking Threats
December 4
Slashdot
In Letter To 20 Automakers, Senator Demands Answers On Cybersecurity
December 4
Auto World News
Senator Challenges 20 Automakers With Letter About Vehicle Hacking
December 4
All Media NY
Ed Markey Writes Letter to Auto Makers Demanding Answers on Car Hacking Threats
December 4
The Security Ledger
Senator Asks Automakers About Cyber Security, Privacy Plans
December 4
Naked Security
Car manufacturers quizzed over their anti-hacking measures
December 3
Automotive News
U.S. senator asks automakers how they will thwart hackers
December 3
Reuters UK
U.S. senator seeks information on carmaker efforts to thwart hackers
December 3
Reuters
U.S. senator seeks information on carmaker efforts to thwart hackers
December 2
SC Magazine
Researchers shed light on car hacking
December 2
SC Magazine
Reboot: In memoriam
December 2
PC Pro
Internet of Things: five unlikely hacking risks
December 1
(IN)SECURE
Report: VB Conference 2013
November 29
Security.nl
Botnets goudmijn voor inlichtingendiensten
November 28
Dark Reading
A Mercenary Approach To Botnets
November 28
ITWeb Africa
High-profile speakers at 2014 Security Summit
November 27
Money Morning
The Next Big Cyber Weapon: Your Car?
November 27
Business2Community
B2B Lead Generation – When Privacy Becomes a Price
November 26
ITWeb
High-profile speakers at 2014 Security Summit
November 25
CBS Miami
High-Tech Features Can Make Your Car A Target For Hackers
November 23
SecuObs.com
Ekoparty 9 – String Allocations in Internet Explorer
November 21
Threatpost
‘Let’s Do Security That Matters’'
November 21
Companies and Markets
Smart grid cyber security market to increase at a CAGR of 28.4% through 2016
November 20
Dark Reading
Healthcare.gov Security Hiccups
November 20
CBS SF Bay Area
Hackers Expose Potentially Dangerous Security Flaws In Automobile Computers
November 19
Tom's Guide
10 Reasons Coin Card Could Be a Security Nightmare
November 19
WGME
Car computer hacking, the next cybercrime
November 18
The Register
Infosec bods scorn card-swiping Coin over security fears
November 17
News Network Communication
Advierten en EU terrorismo clínico
November 17
Elgolfo
Advierten en EU terrorismo clínico
November 13
CBS New York
Staying A Step Ahead Of Car Hackers
November 11
Hartford Business.com
How companies fight back against hackers
November 11
CNN Money
How Corporate America fights hackers
November 10
Netjoven
Hombre convierte dinero falso en billetes legítimos - VIDEO
November 4
Help Net Security
Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware
November 3
El Confidencial
Detener un corazón desde 30 metros
November 2
Motherboard (VICE)
To Turn Plain Paper into Real Money, a Spanish Researcher Hacked a Currency Detector
November 1
The Guardian
Let's hear it for the ladies: women in information security - Part 2
October 31
Security.nl
 Firmware-hack laat valsgelddetector vals geld accepteren
October 31
Pasadena Weekly
Car-hacking chaos
October 31
The Guardian
Let's hear it for the ladies: women in information security - Part 1
October 30
The Next web
Researcher hacks counterfeit money detector to accept any piece of paper as a valid banknote
October 30
Slashdot
Hackers Break Currency Validator To Pass Any Paper As Valid Euro
October 30
Help Net Security
Counterfeit money detector easily hacked to accept fake money
October 30
ITSecurityPro
How to hack a counterfeit money detector
October 30
Threatpost
Researcher Finds Method to Insert Malicious Firmware Into Currency Validator
October 29
Drives & Controls
Vulnerability is found in wireless automation software
October 29
SC Magazine Australia
Car hackers mess with speedos, odometers, alarms and locks
October 27
Cadena Ser
Centinelas de la Red
October 25
Ferret
IOActive uncovers vulnerability in wireless industrial automation software from ProSoft Technology
October 24
Infosecurity Magazine
ICS Flaw in Wireless Automation Software Could Spell Catastrophe for Utilities
October 24
AzOsensors.com
IOActive, Inc. Discover Vulnerability in RadioLinx ControlScape Application
October 23
Dagbladet
Her er mannen bak «verdens farligste søkemotor»
October 23
SC Magazine
Industrial software flaw could allow manipulation of energy processes
October 23
Threatpost
Weak Key Generation Plagues Wireless Industrial Automation Software
October 23
USA Today
State Department webpages defaced
October 23
Leonoticias.com
El cazador de ataques cibernéticos
October 23
Softpedia
Emergency Alert Systems More Vulnerable After Being Patched, Experts Warn
October 22
Forbes
Security That Keeps Medical Implants Safe from Hackers
October 22
Threatpost
Months later, EAS equipment still vulnerable
October 21
Focus
Hacker knacken Schrittmacher
October 21
The Korea Times
Hi-tech cars open to cyber hacking
October 21
Wall Street Italia
Nel futuro hacker potrebbero colpire le automobili
October 19
Slashdot
No Zombie Uprising, But Problems Persist With Emergency Alert System
October 19
Süddeutsche.de
Hackerangriffe auf Autos Fremd gesteuert
October 18
Taloussanomat
Poliisi pelkää: Pian rikollinen kauko-ohjaa atoasi
October 18
CNBC
Car hacking: The next global cybercrime?
October 18
SC Magazine
Alerts of "rising dead" still exploitable on EAS
October 18
Security Ledger
Zombies Gone, Problems Persist With Emergency Alert System
October 17
Infosecurity Magazine
Let's Hear it for the Ladies: Women in Information Security
October 17
Dagbladet
I verste tilfelle kan liv gå tapt
October 15
Autoweek
Cyber threats targeting your car
October 15
Financial Review
Business understanding of cyber attacks a decade out of date
October 15
Dark Reading
The Reality Of Freshly Minted Software Engineers
October 15
Fast Company
Think You Can Live Offline Without Being Tracked? Here's What It Takes
October 9
WZ Newsline
Terror-Gefahr: Das fremdgesteuerte Auto als ziemlich reale Bedrohung
October 7
TechWeek Europe
Popular Processors 'Are Riddled With Backdoors'
October 5
TribLive.com
In Internet age, cars, homes more vulnerable to hackers
October 4
Metro TV News
Electronic Computer Unit pada Mobil Gampang Diretas
October 3
Threatpost
Pen Testing Using Live Malware Becoming a Must
October 1
Merdeka
Evolusi mobil sebagai perangkat komputer yang bisa diretas
October 1
Dark Reading
Penetration Testing With Honest-To-Goodness Malware
October 1
Help Net Security
Hackers gather in Colombia for Security Zone 2013
September 23
Threatpost
ICS Vendor Fixes Hard-Coded Credential Bugs Nearly Two Years After Advisory
September 19
ITProPortal
ISACA EuroCACS 2013: Boardrooms not investing enough in cyber-security
September 18
The Independent
The rise of car hacking: In-car technology has led to thieves remotely taking over our vehicles
September 17
Mashable
NSA Contract With French Hacking Company Revealed
September 16
Fourth Estate
Smarter cars are open for hackers to take the wheel
September 12
SC Magazine Australia
Ion beam used to wiretap secure chips
September 11
MIT Technology Review
"Tamper-Proof" Chips, with Some Work, Might Give Up Their Secrets
September 6
ISS Source
ProSoft Patches PRNG Vulnerability
September 5
Yahoo! Finance
FTC cracks down on hacked video camera maker
September 5
Dark Reading
Botnet Behind Mysterious Spike In Tor Traffic
September 5
Digital Journal
Will hacking into car systems soon be an everyday concern?
September 5
Daily Tech
Charlie Miller Releases Open Source "Car Sabotage Toolkit"
September 5
Before It's News
Security Firm: Anyone Computer Savvy Can Take Control of Your Car
September 4
ABA Journal
Hack attacks could fuel carjacks, experts say
September 4
CIO Today
Hackers Find Weaknesses in Car Computer Systems
September 4
HNGN
Is Hacking Possible for a Computerized Car?
September 3
Detroit Free Press
Hackers find weaknesses in cars' computer systems
September 2
MSN Dinheiro
Hackers poderão controlar carros, invadir casas e até matar pessoas remotamente
September 2
Barradas Comunicacao
Hackers poderão invadir carros e casas com o advento da 'internet das coisas'
August 31
Yahoo! News
How Hackers Can Grab Your Car
August 30
Dark Reading
The Easiest Way To Deface A Website Is To Target The Domain Registrar
August 29
Today
How hackers can hijack your car
August 28
Huffington Post
The Car Hacks That Could Cost You Big Time
August 28
autoblog
Ya es posible hackear un coche y controlarlo a distancia
August 28
USA Today
'New York Times' website back up after cyberattack
August 28
digitriad.com
'N.Y Times' Blames Hackers In Latest Website Crash
August 28
Kare11
NY Times website back up after being hacked
August 28
Burlington Free Press
'New York Times' site being restored after cyberattack
August 28
Philippine Daily Inquirer
Warning: your car can be hacked
August 27
USA Today
'NY Times' blames hackers in latest website crash
August 26
Infosecurity Magazine
The Insecure Pacemaker: FDA Issues Guidance for Wireless Medical Device Security
August 26
Computerworld
Government wants PSYOPS tool to hijack every AM and FM radio station in target area
August 26
drmsriram
Hackers now steering into cars, homes
August 24
The Blade
Hackers turn from emails to security in homes, cars
August 23
DesignNews
Black Hat Conference Highlights Hacking Demos
August 23
PolicyMic
Here's How Hackers Are Saving the World
August 22
Before It's News
Google Partners Up With Continental For Self-Driving Car
August 21
CIO Today
Why Online and Mobile Ads Are Ripe For Hacking
August 20
VICE
These Guys Hacked a Car and Now They Want to Show You How to Do It Too
August 19
USA Today
Why online and mobile ads are ripe for hacking
August 19
Cape Cod Times
Making sure hard drives don't make driving harder
August 16
Elgolfo.info
Hackean un Toyota Prius; la seguridad de los autos en entredicho
August 16
Xombit
Hackean un Toyota Prius, la seguridad de los coches está en juicio
August 15
USA Today
Hacking assaults on media sites intensify
August 15
USA Today
First Take: Why big media is ripe for hacking
August 15
13WMAZ
Washington Post Hack Signals Assault on Media Outlets
August 15
USA Today
Why the New York Times website went dark
August 15
TopNews
Times says website failure was caused during regular maintenance, not due to cyberattack
August 15
The State
Taking over cars, and homes, remotely
August 15
Black Christian News
Some Experts Don't Buy Explanation that 'Human Error', Not Hacking, Caused NY Times Website to Go Offline
August 15
The Advertiser
Why the New York Times website went dark
August 15
faluu.com
Toyota Prius hackeado, la seguridad de los coches puesta en entredicho
August 15
The Donga
Evolving hackers capable of attacking cars, homes, life
August 15
Brisbane Times
As cars and homes and even toilets get smarter, they get more hackable
August 14
Yahoo Finance
Disruptions: As New Targets for Hackers, Your Car and Your House
August 14
Veteknoloji.com
Otomobil ve evlere 'hacker; ilgisi!
August 14
Automobiel Management
Hoe hack je een auto? (filmpje)
August 14
01 Business
Pipelines et gazoducs potentiellement vulnérables à une cyberattaque indécelable
August 14
Komputer
Hackere kan styre din bil
August 14
Dark Reading
The Increasing Failure Of Malware Sandboxing
August 13
Free Press Journal
Hackers can also hack cars, cause accidents
August 13
Engineersonline.nl
Hoe hack je een auto? (video)
August 13
StrarTribune Business
Your car and your house are new targets for hackers
August 13
Times of India
Beware! Hackers may 'steal' your car
August 12
Lemond.fr
Les voitures connectées, nouvelles cibles des pirates
August 12
Today
Hackers shift focus to cars and your house
August 12
The Economic Times
New targets for hackers: Your car and your house
August 12
Silicon Valley Business Journal
Car hack instead of carjack? Hackers targeting your car, house or even pacemaker
August 12
The Boston Globe
Will hackers soon target cars, homes, and toilets?
August 12
Economic Times
New targets for hackers: Your car and your house
August 12
NDTV
Taking over cars, and homes, remotely
August 12
Z24.nl
Moderne auto do computerhackers
August 12
derStandard.at
Wenn Hacker das Auto und die Toilette stilllegen
August 12
EFYTimes
Beware! Hackers Can Steal Your Car
August 12
ITWeb
Best of show from Black Hat, Def Con
August 11
The New York Times
Disruptions: As New Targets for Hackers, Your Car and Your House
August 10
SecurityWatch
10 Black Hat Hacks That Will Make You Put On a Tinfoil Hat
August 9
Dark Reading
IOActive Launches New Security Intelligence Service
August 8
InternetNews.com
Remotely Exploiting Industrial Infrastructure - It's Easy: Black Hat
August 8
SC Magazine UK
IOActive launches intelligence service for information analysis
August 8
San Francisco Chronicle
IOActive Launches New Security Intelligence Service
August 8
EE Times
TI Illustrates Car Security Threats
August 8
AOL Autos
Hackers Offer Advice To Automakers On How To Prevent Attacks
August 7
IT Business Net
IOActive Launches New Security Intelligence Service
August 6
Daily Dot
Hacking conference announces all-female keynote lineup
August 5
CNN
The five scariest hacks we saw last week
August 5
Huffington Post
10 Sci-Fi Hacks That Are Now a Reality
August 5
Network World
Not cyber myths: Hacking oil rigs, water plants, industrial infrastructure
August 5
Dark Reading
Car Hackers Release Tools
August 5
SC Magazine
Hackers release tools, code used to control Ford and Toyota test cars
August 5
TechWeek Europe
Researchers Expose Industrial Infrastructure Sabotage Risk
August 5
IT World
Black Hat 2013: Rise of the (Smart) Machines
August 4
TechCrunch
What Happens At Def Con Stays With Us All
August 4
eWeek
Industrial Infrastructure Vulnerable to Remote Tampering: Black Hat
August 4
Digital Journal
Car hacking tricks revealed at Las Vegas
August 3
PC World
Defcon researchers reveal tricks behind their car hack
August 2
CNET News
Car hacking code released at Defcon
August 2
Softpedia
All-Women Keynote Lineup Announced for Hack in the Box 2014 Amsterdam
August 2
Help Net Security
Hacker expo and all-women keynote line coming to Hack In The Box
August 2
Computerworld
Researchers reveal methods behind car hack at Defcon
August 2
Examiner.com
Sacred security cows get butchered at Black Hat
August 2
CNN
Hackers control car's steering and brakes
August 2
Science Friday
Hacking Under the Hood and Into Your Car
August 2
NPR
Hacking Under the Hood and Into Your Car
August 1
SC Magazine
Video: Hacking industrial control systems
August 1
Fox News
7 scariest hacks to come out of Black Hat
August 1
MIT Technology Review
Hacking Industrial Systems Turns Out to Be Easy
August 1
SearchSecurity
Black Hat 2013 opens with testy keynote, smart device hacks
August 1
Wall Street Journal
Researchers Demonstrate Attacks on Critical Infrastructure at Black Hat
July 31
NASDAQ
Pacemakers, Cars, Energy Grids: The Tech That Should Not Be Hackable, Is
July 31
CBS News
5 scariest cybersecurity threats at Black Hat, Defcon
July 30
Nitrobahn
Car Hacking Researcher's Use Prius, Escape To Take Control Of Standard Cars
July 30
Best Cars
Could Hackers Take Over Your Car?
July 30
CSO Online
Car hack highlights march toward remote control of critical systems
July 30
NPR
With Smarter Cars, The Doors Are Open To Hacking Dangers
July 30
Car Advice
Car security challenged by hackers, computer scientists
July 30
PC Advisor
Car hack highlights march toward remote control of critical systems
July 29
TODAY
Two experts demonstrate carjacking gone digital
July 29
SC Magazine
Car hackers' appearance on the 'Today' show was important because they were on the 'Today' show
July 29
The Telegraph
Hackers 'take control' of Toyota Prius
July 29
Herald Scotland
Hackers will reveal 'car attack secrets'
July 29
CIO Today
Sleuths To Demo Car Hack Gone Steer-Crazy
July 29
MTV
Here We Have A Guy Driving A Car With A NES Controller
July 29
DVICE
Hackers can take control of your car with an NES controller
July 29
Silicon Angle
Hacked: How Safe is Your Smart Car?
July 29
Policymic
Watch These Hackers Invent the Future Of Assassination
July 29
Crazy Engineers
Software Hackers Plan To Release Car Hacking Tools At Def Con Hacking Conference
July 29
Ottawa Citizen
Cybersecurity researchers hack into cars and steer them with obsolete video game controllers
July 29
RedOrbit
DARPA-Funded Hackers Gain Control Of Toyota Prius, Ford Escape
July 29
Graham Cluley
Car hacking: there's more than one way to crash a car [VIDEO]
July 29
SC Magazine
The chilling effects of the Volkswagen injunction on British research
July 29
TechSpot
Hackers to detail methods used to overtake Prius, Escape at Def Con
July 29
Venture Beat
Prius pwned: Hackers exploit steering & brakes on 'smart' car
July 28
Fox News
Hackers plan to offer blueprint for taking over Prius, Escape
July 28
After Dawn
White hat hackers to release software used to crack critical car systems at DefCon
July 28
Engadget
Automotive takeover schemes to be detailed at Defcon hacker conference
July 28
Times of India
Software experts to release code for car hack
July 28
Reuters
Software experts attack cars, to release code as hackers meet
July 28
The Register
British boffin muzzled after cracking car codes
July 27
MSN Now
This is how easy it is for a hacker to take over your moving car
July 27
Digital Journal
Computer hackers targeting cars to expose vulnerability
July 27
Kotaku
Hackers Can Take Over Cars and Drive Them With a Nintendo Controller
July 27
CTV News
Car-hacking researchers hope to wake up auto industry
July 27
The Escapist
Nintendo Controller Used to Drive Hacked Cars
July 27
Domain-B
Researchers demonstrate carjack over net
July 27
Taipei Times
Car-hacking mischief potential is great
July 27
MSN Now
This is how easy it is for a hacker to take over your moving car
July 27
Business Insider Australia
Wild Computer Hack Remotely Controls Cars
July 26
IT World Canada
Oil, gas field sensors exposed to radio wave attack
July 26
RedOrbit
Monroe Electronics Offers Confirmation On EAS Vulnerability
July 26
The Daily Caller
Computer researchers demonstrate how cars can by hacked via laptop
July 26
TechNews Daily
Hackers Hijack Prius with Mac Laptop
July 26
Technabob
Digital Carjacking: The Smarter They Are, The Dumber They Are
July 26
Nintendo Life
Weirdness: Hackers Use NES Pad To Drive Car
July 26
Crazy Engineers
Hackers Hack Into Car's Computer Systems & Electronics To Alter Security Systems
July 26
The Age
Revealed: new ways to hack critical infrastructure
July 26
The Peninsula
Researchers to show new ways to hack oil, gas, water plants
July 26
TVNZ
Key US industries vulnerable to cyber attacks - research
July 26
Computerworld UK
Oil, gas field sensors vulnerable to attack via radio waves
July 25
WND Money
Hackers Reveal Nasty New Car Attacks
July 25
Network World
Oil, gas field sensors vulnerable to attack via radio waves
July 25
WSB Radio
Researchers to show new ways to hack oil, gas and water plants
July 25
Slashdot.org
Hackers Reveal Nasty New Car Attacks
July 25
UP Steam
Demonstration of cyber attacks planned
July 25
WOKV.com
Researchers to show new ways to hack oil, gas and water plants
July 25
Atlanta Journal Constitution
Researchers to show new ways to hack oil, gas and water plants
July 25
BBC News
Car hackers use laptop to control standard car
July 25
Metro
Car hackers: Researchers to reveal how easy it is to take over moving vehicle
July 25
Reuters
Researchers to show new ways to hack oil, gas and water plants
July 25
Autoweek
Hackers compromise Prius, seize control of the wheel, brakes and more
July 25
Arab News
Key industries remain vulnerable to cyber raids
July 25
LA Observed
Hacking into your car's computer system
July 25
Washington Post
Here's how hackers could crash your car
July 25
Opposing Views
Hackers Show How To Take Control Of Car (Video)
July 25
Bold Ride
How DARPA Can Hack Your Car
July 25
Daily Mail
Hackers hijack software in a CAR and remotely control the steering, brakes and horn using a laptop
July 25
Motor Trend
Video Find: Watch Hackers Hack into Toyota Prius, Ford Escape
July 25
IBT
Car Hacking: DARPA Funded Researchers Take Control Of Toyota Prius And Ford Escape Using Laptop [VIDEO]
July 25
recombu
Watch hackers take control of this Toyota Prius using a MacBook
July 24
NU.nl
Onderzoekers hacken remmen van auto's
July 24
SC Magazine
DefCon car hacking talk will detail how an outsider can "physically control" the vehicle
July 24
SC Magazine
Researchers 'physically' hijack cars
July 24
Forbes
Hackers Reveal Nasty New Car Attacks - With Me Behind The Wheel (Video)
July 23
Computerworld
FDA asks hackers to expose holes in medical devices, but many researchers fear CFAA & jail
July 15
Washington Times
Over-the-air alerts for emergencies are vulnerable to hacking
July 15
Dark Reading
Hacking The Emergency Alerting System
July 12
eSecurity Planet
IOActive Finds Security Flaws in U.S. Emergency Alert System
July 11
FierceGovernmentIT
Emergency Alert System vulnerable to hacking
July 11
Street Insider
IOActive Expands by Opening New Office in South Africa
July 11
Tech News World
With Zombies Explained, National Alert System Can Go Back to Sleep
July 11
DigitalJournal
IOActive Expands by Opening New Office in South Africa
July 11
Acumin
Emergency broadcasts 'are open to hacking'
July 11
Computer Business Review
EMERGENCY BROADCAST SYSTEMS VULNERABLE
July 10
The Blaze
‘CRITICAL’ VULNERABILITY MADE EMERGENCY ALERT SYSTEM HACKABLE
July 10
SC Magazine
Default password bug, not the rising dead, prompted emergency zombie alert
July 10
The Week Magazine
No, the Zombie Apocalypse has not begun: How hackers infiltrated the Emergency Alert System
July 10
Northern Voices Online
Zombie Apocalypse: Emergency broadcast equipment in US can be hacked
July 10
The Inquisitr
US Emergency Alert System Has ‘Critical’ Vulnerability
July 10
Infosecurity
EAS Vulnerability: Bodies of the Dead Could Rise Again
July 10
BLORGE
The Emergency Alert System Is Hackable - For Now
July 9
Reason
Emergency Alert System Vulnerable to Hacking
July 9
The Atlantic Wire
There Are at Least Three Easy Ways to Hack the Emergency Alert System
July 9
GCN
EAS vulnerability exposes the soft underbelly of firmware
July 9
Huffington Post
Some Parts Of The Emergency Alert System Can Be Hacked, Experts Say
July 9
BBC
Emergency broadcasts can be hacked, US researchers say
July 9
Red Orbit
This Is Not A Test: Vulnerability Found In US Emergency Alert System
July 9
CIO Today
'Zombie' Alert Shows Emergency Broadcasts Can Be Hacked
July 9
Good Gear Guide
Emergency broadcast equipment in US vulnerable to hackers
July 9
COMPUTERWORLD
Hackers can hijack unpatched Emergency Alert System devices, broadcast bogus warnings
July 9
PC Magazine
Emergency Alert System Vulnerable to Hackers, Report Finds
July 9
Mashable
U.S. Emergency Alert System Has 'Critical' Vulnerability
July 9
Yahoo News
There Are at Least Three Easy Ways to Hack the Emergency Alert System
July 9
CSO
Emergency broadcast equipment in U.S. vulnerable to hackers
July 9
The Register
Emergency alert system easily pwnable after epic ZOMBIE attack prank
July 9
Net Security
US Emergency Alerting System vulnerable to attack
July 9
PC World
Emergency broadcast equipment in US vulnerable to hackers
July 8
ARS Tecnica
We interrupt this program to warn the Emergency Alert System is hackable
July 8
WIRED
This Is Not a Test: Emergency Broadcast Systems Proved Hackable
June 28
Motherboard
How Easily Can a Moving Car Be Hacked?
June 27
ZDNet.de
Charlie Miller wil tonen hoe je auto's moet hacken met een iPhone
June 27
CTV News
Could medical devices be the next target for cyberattacks?
June 26
NY Daily News
Gov't warns medical device manufacturers to step up cybersecurity measures against hackers
June 26
Computerworld
Car hacking: Car cyberattack a possible theory behind journalist's death
June 26
MacWortld.nl
Beruchte iPhone-hacker showt autokraak op DefCon
June 25
Oman Tribune
Hackers could target insulin pumps, pacemakers: Experts
June 25
Help Net Security
Car hack attack a possible theory behind journalist's death
June 25
VICE
I worked out how to hack pacemakers and make hearts explode
June 25
The Register
Charlie Miller to tell Vegas punters how to hack your car
June 25
Nation
Is there a real threat?
June 25
Softpedia
Researchers to Show at DEFCON 21 How to Hack a Car
June 24
IndustryWeek
Manufacturers of Medical Devices Warned About Hacking
June 24
Times of Oman
Hacking into our body
June 24
Arab News
New frontier for cybersecurity: Human Body
June 24
Le Parisien
Prochaine cible pour les cyber-pirates: le corps humain
June 24
Times of Oman
Hacking into medical devices no more fiction now: US regulators
June 23
Mondo
I medicinski aparati na meti hakera?
June 23
El Comercio.pe
El cuerpo humano puede ser la próxima víctima de los hackers
June 22
Terra
El cuerpo humano, próximo objetivo de los ciberpiratas
June 17
Infosecurity Magazine
FDA issues medical device safety warning
June 14
SC Magazine
Happy Hour Hot Links: Week of 6/10
June 13
Dark Reading
Letter Of (Cyber) Marque And Reprisal
June 11
ThreatPost
Unnamed, Popular ICS Firmware Contains Hard-Coded FTP Credential
June 6
ITBiz
Bezpečnostní přehled: Evoluce škodlivých kódů
June 5
ThreatPost
Schneider patches 18-month old SCADA bugs
June 5
The Register
Schneider moves on ancient SCADA vuln
June 4
Tom's Hardware
C‘è chi rema contro la sicurezza di Internet
June 4
InSight Crime
Liberty Reserve Case Exposes New Frontiers in Laundering Digital Cash
May 31
CSO
Google zero-day disclosure change slammed, praised
May 31
CNET
Google push for faster zero day fixes hits a wall: Other companies
May 31
Help Net Security
Questioning Google's disclosure timeline motivations
May 30
Tech Week Europe
Google Cuts Down Zero-Day Disclosure Period To 7 Days
May 30
The Register
Ruby on Fails: Zombie SERVER army built thanks to Rails bug
May 28
Dark Reading
IOActive Labs Research: Identify Back Doors in Firmware By Using Automatic ...
May 27
mHiMSS
Malware, hacking pose a threat to device safety
May 27
IT Avisen
Enkelt å hacke strømmåleren
May 25
BBC
Smart meters: Hacking fear ahead of nationwide roll-out
May 24
Golem
Fast alle X.org-Bibliotheken mit Sicherheitslücken
May 24
BBC
Smart meters need to be harder to hack, experts say
May 24
Threat Post
HARD-CODED ICS CREDENTIALS GETTING EASIER TO FIND
May 24
The Register
Feds slam hacker-friendly backdoors in jalopy, grub factories
May 23
SC Magazine
Critical vulnerability discovered in industrial control product
May 23
The Australian
Hackers could trigger heart attacks
May 23
IOActive Press Release
IOActive Discovers Backdoor Vulnerabilities in TURCK Industrial Automation Devices
May 23
Reuters
Feature: 'Irrational' hackers are growing U.S. security fear
May 17
CSO Security and Risk
Ten tweets with Gunter Ollmann
May 13
Dark Reading
Ten Emerging Threats Your Company May Not Know About
May 7
Circle ID
Bypassing Geo-Locked BYOD Applications
May 6
Le Journal de Montréal
Huit Façons de Mourir à Cause des Pirates Informatiques
May 5
Bloomberg
Cheapest Way to Rob Bank Seen in Cyber Attack Like Hustle
May 3
BSides San Antonio
IOActive's David Balcar to Present on Breaches and Mitigation at BSides San Antonio
May 2
COMPUTERWORLD
Security Android blijft een zorgenkindje
May 1
CSO
Google Play changes bring cautious optimism on Android security
May 1
PC Advisor
Google Play changes bring cautious optimism on Android security
May 1
Network World
Google Play changes bring cautious optimism on Android security
April 24
MDT Mag
Is a Hacked Pacemaker Capable of Mass Murder?
April 12
Infosecurity Magazine
ICS-CERT reports two hacks on building management systems
April 4
Tech Talk
Would the Mob Really Break Your Virtual Kneecaps With Counterfeit Chips?
April 1
Security Ledger
Home Invasion: Home Routers May Be The Next Big Hack
March 26
Threat Post
ICS Vulnerabilities Surface as Monitoring Systems Integrate with Digital Backends
March 25
Circle ID
SQL Injection in the Wild
March 21
TECH TELLING
LinkedIn is a hacker‘s dream tool
March 13
CRN
Equifax, Other Credit Bureaus Acknowledge Data Breach
March 13
COMPUTERWORLD
Security of open-source software again being scrutinized
March 1
eSecurity Planet
RSA: Do You Need Mobile Anti-Virus?
February 19
CRN
Behind The Facebook Breach And Other High-Profile Attacks
February 18
The Register
Brace for MORE ZOMBIE ATTACK ALERT pranks, warns security bod
February 15
InformationWeek
Zombie Hackers Exploited Emergency Alert System Security Flaws
February 15
ZDnet
Cybersecurity debate won't amount to a hill of default passwords
February 14
ThreatPost
Flaws in Emergency Alert System Hardware Allow Remote Login, Zombie Alert Insertion
February 14
Christian Science Monitor
Why 'zombie' cyberattack is a real concern for Emergency Alert System
February 14
Chicago Business Tribune
Zombie hack blamed on easy passwords
February 14
Security Watch
Why You Should Worry About the Zombie Apocalypse Alert Hoax
February 13
SC Magazine
Known bugs could be to blame for zombie alert prank
February 13
CIO
Emergency Alert System devices vulnerable to hacker attacks, researchers say
February 13
Security Dark Reading
Building and Maintaining Database Access Control Permissions
February 11
USA Today
Companies Use Cyberdefense To Limit Damage
February 5
SANS SCADA
IOActive's Christopher Tarnovsky to contribute to a Keynote Panel: 'Reality Check 2013: SCADA Now and Next' at 2013 North American SANS SCADA Summit
January 23
V3
Security firm warns Twitter flaw could give apps unauthorised access to personal messages
January 22
InfoWorld
Twitter flaw gave third-party apps unauthorized access to private messages, researcher says
January 22
SC Magazine
Twitter bug gives third-party apps access to private data
January 21
Net Security
What makes a good information security professional?
January 16
Computer Weekly
IOActive's Wim Remes: Cloud security key to BYOD, (ISC)2 study shows
January 14
Net Security
Looking back at a year of Microsoft patches
January 10
CRN
Attackers Targeting New Java Zero-Day Flaw
January 5
Industry Blog Post
Brace for more attacks on industrial systems in 2013
January 2
SC Magazine
Not your parents' threatscape: APTs

2012

November 29
Healthcare Info Security
How to Minimize Medical Device Risks
November 26
Computerworld
Researcher finds 20-plus flaws in SCADA software
November 7
PRLog
Web Application Security Greatest Hits
October 29
ZDNet
Cybergeddon now? Industrial control systems targeted
October 28
American Free Press
Cyberattacks on U.S. banks an excuse for war?
October 26
Krebs On Security
DHS Warns of Hacktivist Threat Against Industrial Control Systems
October 1
Dark Reading
Attackers Engage In 'False Flag' Attack Manipulation
October 1
Mundo en Línea
Vuelve la unica Conferencia internacional de Hacking en Chile
September 26
Washington Post
In Cyberattacks, Hacking Humans is Highly Effective Way to Access Systems
September 18
Computing.co.uk
Analysis: Industrial Control Systems Under Attack
August 22
IT Pro Portal
Emailed Password Reset: A Weak Security Link
August 20
Threat Post
Own the Email, Own the Person
August 20
PCMag.com
Password Resets on Email Key to Online Compromise
August 13
IT World
Leaky Websites Provide Trail of Clues About Corporate Executives
August 10
On the Media
Eireann Leverett and Shodan
August 10
On the Media
Assessing the True Threat of Cyberware
July 31
Technology Review
Hey, Hackers: Defense Is Sexy, Too
June/July 2012
ICS-CERT Monthly Monitor
Incident and Cyber Emergency Responses to Industrial Control System Vulnerabilities
July 26
SC Magazine
Black Hat: Security Pros Must Evolve Their Defensive Strategy
July 23
Reuters
Web-connected Industrial Controls Stoke Security Fears
July 5
SC Magazine
Second 44Con to Run Over Five Days with Dedicated Infosec Track Day
June 30
NetworkWorld
If Security were the Only Factor, a Windows 8 Upgrade would be a No-brainer
June 14
eWeek
Spear-Phishing Attack on Industrial Consulting Firm Linked to Larger Campaign
June 13
CSO Online
New Spear Phishing Campaign Targets Universities, Government Contractors, and Security Companies
June 13
ThreatPost
Attacks Targeting US Defense Contractors and Universities Tied to China
April 26
Computer Weekly
Are Women Better Suited for Leadership Roles in IT Security?
March 27
Voice of Russia London
Josh Pennell Joins a Panel to Discuss the Future of Cyber Warfare
March 12
CNNMoney
LinkedIn is a hacker's dream tool
February 14
Ghacks.net
SSL Traffic Analysis Reveals What You are Looking at on Google Maps
February 13
Threat Post
Finding Location Data in Google Maps SSL Sessions
January 19
Softpedia
Windows Installer Vulnerabilities Allow Privilege Escalation
January 18
ZDNet
Ready-made Microsoft Windows zero-day?
January 18
Threat Post
Elevating Privileges via Windows Installers
January 17
Power Industry News
SMI Group Reports on European Smart Grid Cyber Security Forum
January 9
Forbes.com
Reddit Founder, DNS Hacker, and Other SOPA Critics will Address Congress in Hearing

2011

December 14
TransWorldNews
BAE Systems, Industrial Defender, IOActive and VeriSign dominate the Global Smart Grid Cyber Security Market
December 1
TechSpot
China could be leveraging electronic exports to spy on the US
November 30
Bloomberg
Obama Invokes Cold-War Security Powers to Unmask Chinese Telecom Spyware
November 19
iTWire
Google Maps: we know what you're looking at
November 3
The Register
Smart meters: Nothing can possibly go wrong, says gov
November 2
Sys-Con Media
Research and Markets: Global Smart Grid Cyber Security Market 2010-2014 with BAE, Industrial Defender, IOActive and VeriSign Dominating the Market
September 28
CNN
Are You in Danger of "Drive-By" Hacking?
September 21
PR Newswire
Renowned Cyber Security Expert to Participate in Industry's Leading Conference Focused on Smart Grid and Cyber Security
September 19
TechFlash
T-Mobile lines up mobile-wallet partners to compete with Google
September 7
Cracked
8 Things You Won't Believe can be Hacked
September 1
EnergyBiz
Integrating Communications: Securing Power from Cyber Threats
July 26
Sys-Con Media
Ambassador Cofer Black to Keynote Next Week at Black Hat USA 2011
July 21
Financial Post
Keep on Top of Online Security—Or Else
June 21
Reuters UK Edition
Employees Become Front Line in Cybersecurity Fight
May 19
PC World
Six Biggest Threats from Cybercriminals
May 4
The Guru Review
Sony Hires Firms to Clean up After Major Data Breaches
May 4
Utility Week
Metering Minefield
May 4
Daily Tech
Sony Hit with First Lawsuit After Losing 101 Million Customer Records
April 19
Computer Weekly
Infosec 2011: Canon Highlights Security Risk of Improperly Configured Printers
April 13
The Guardian
Smart Meter Security Under the Spotlight
February 4
Wired Magazine UK edition
Your Gas Meter: The New Front Line in Cyberwar
January 8
Information Week
Top 5 Cloud Computing Predictions for 2011

2010

December 14
Information Week
Amazon EC2 Achieves Payment Industry Certification
October 29
CNET
Scariest tech happening of 2010?
October 6
Threatpost
Remotely Jackpotting ATMs
September 15
PhysOrg.com
Hacker breaks into ATMs for good, not evil
September 1
SC Magazine
Utility companies worldwide are rolling out smart meters but are they secure?
August 23
ZDNet
ATM Makers Patch Black Hat Cash-Dispensing Flaw
August 18
Dark Reading
Embedded Systems Can Mean Embedded Vulnerabilities
August 12
PBS News Hour
Online Crime a Cat-and-Mouse Game for Hackers, Security Companies
August 6
CNN
How Safe are ATMs?
August 5
International Business Times
ATMs Can Be Hacked By Phone
August 3
eWeek Europe
Smart Meters Will Be Hacked, Warn Researchers
August 2
Forbes
Conference Wrap-Up: Apple, Google, BP And Others Spill Sensitive Data On The Phone
August 2
SC Magazine
How He Attacked ATMs: Barnaby Jack Press Conference at Black Hat 2010
August 1
ABC News Australia
Hacker Shows off Remote ATM Exploit
July 30
AOL News
Barnaby Jack Ingeniously Hacks ATMs at Black Hat
July 29
The Globe and Mail
ATMs Spill Their Guts in New Computer Attacks
July 29
PC World
Important Lessons to Learn from the Black Hat ATM Hack
July 29
Technology Review
How to Make an ATM Spit Out Money
July 28
eWeek
Inside Black Hat: Day One at the Security Conference
July 28
SC Magazine
Black Hat 2010: Researcher Jack Uses Design, Authentication Flaws to Force ATMs to Spit out Cash
July 28
ZDNet
Hacker Breaks Into ATMs, Dispenses Cash Remotely
July 28
Computer World
Barnaby Jack Hits ATM Jackpot at Black Hat
July 28
CNET
Security Researcher Demonstrates ATM Hacking
July 22
Information Week
Black Hat: Mobile Flaws Get Attention
July 21
Help Net Security
BSides Las Vegas 2010 speaker line-up announced
July 10
The Seattle Times
'Barefoot Bandit' Harris-Moore May Have Been Nothing Without the Internet
June 10
Macworld
Researchers: Windows 7 and Mac OS X Both Hit by Fundamental Flaws
June 8
Dark Reading
Microsoft Patches IE Flaw Used In Attack That Bypassed Its Built-In Security Controls
May 25
Palestinian Energy and Natural Resources Authority
Securing the Smart Grid
May 17
eWEEK Europe
HP Admits Smart Grid Security Is An 'Afterthought'
May 14
Engineer Live
Securing the Smart Grid: The Road Ahead
May 13
Scientific American
Securing the Smart Grid
May 6
eWeek Europe
Are Smart Meters a Dumb Idea?
April 29
eWeek Europe
Why Green IT is not an Election Issue
April 28
eWeek Europe
Infosec 2010: Smart Meters Bring Security Risks
April 12
Infosecurity Magazine
Comment: Smart Grid Security - The Path Ahead
April 9
CNet News
Securing the Smart Grid
March 17
New York Times
Steps to Take to Reduce the Anxiety of Paying Online
February 5
Data Center Edge
Securing the Smart Grid: The Road Ahead
January 15
The Register
Texas Instruments to Patch Smart Meter Crypto Blunder
January 13
CBS News
Do Clues Point to Global Hack Conspiracy?
January 10
North County Times
Experts Hack New Power Meters

2009

December 18
The New York Times
Major Online Attack on Twitter is 3rd This Year
December 17
Energy Pulse
Insight Analysis and Commentary on the Global Power Industry
December 15
PC World
10 Predictions for 2010: Kaminsky and Weatherford
December 8
eWeek Europe
Cisco: Smart Grids can Improve the World
December 3
PC Pro
The Top Ten Security Heroes
December 2
Dark Reading
Top Experts Examine Causes of Breaches in Spy Museum Forensics Panel
November 17
eWeek
Cyber-war Could Threaten Security of Critical Infrastructure
November 9
King5.com
Virus drains $500,000 from Maple Valley Business
October 29
Interesting Finds
Threat Level Privacy, Crime and Security Online: Feds' Smart Grid Race Leaves Cybersecurity in the Dust
October 20
IAGS Journal of Energy Security
Making a Secure Smart Grid a Reality
October 19
Apple Support
About the Security Content of Security Update 2009-003/Mac OS X v10.5.8
October 16
Dark Reading
IOActive Discovers Critical Flaw in Adobe Reader 9.1.2
October 9
Earth2Tech
10 Things to Know About Smart Grid Security
October 3
The Telegraph
Smart Energy Meters in Homes Could be Hacked
September 30
Info World
Smart Grid vulnerabilities could cause widespread disruptions
September 29
Computer World
Report Highlights Smart Grid Security Vulnerabilities
September 29
The H Security
Security Catalogue Presented for Smart Electrical Power Grids
September 28
Dark Reading
New NIST Report Sheds Some Light on Security of the Smart Grid
September 14
Dark Reading
DNS Cloud Security Services Arrive
September 1
MIT Technology Review
Meters for the Smart Grid
August 28
gHacks.net
Email Client Mozilla Thunderbird 2.0.0.23 Update.
August 26
The Guardian
Smart Meters Power Ahead
August 15
King5.com
Phishing Getting More Sophisticated
August 10
Government Computer News
Digital certificate standard yields to hackers
August 10
IT Business Edge
Smart Grids and Security
July 31
Earth2Tech
Smart Meter Worm Could Spread Like a Virus
July 31
MIT Technology Review
Smart Meters not Ready for Primetime
July 30
Dark Reading
Black Hat: PKI Hack Demonstrates Flaws in Digital Certificate Technology
July 28
Internet News
Black Hat Exposes Smart Grid Security Risks
July 28
The Washington Post
Smart Grid Raises Security Concerns
June 25
Search Security
Kaminsky interview: DNSSEC addresses cross-organizational trust and security
June 21
eWeek
Smart Grid Security in the Spotlight at Black Hat
June 18
SmartMeters.com
Itron Working with DoE on Smart Grid Security.
June 18
IAGS Journey of Energy Security
The Security Vulnerabilities of Smart Grid.
June 18
Earth2Tech
Cyber War Games, Worms and Spies, Oh My!
June 17
Green Tech Grid
Smart Meter Security: A Work in Progress.
June 12
The Register
Buggy "smart meters' open door to power grid botnet
May 19
Energy Pulse
Building the Smart Grid: Proven Methods to Secure the Future
April 30
Forbes
Smart Grid gets a Security Kick
April 6
Express Computer Online
A tale of two companies
March 30
ABC News
High-Tech Hijinks: Top 7 Web and PC Pranks
March 27
Processor
Wireless Encryption and Security: Top Issues and Technologies to Consider
March 24
IT Pro
Security risk to "smart grids"
March 24
Security Focus
Smart-grid firms need security education
March 24
Information Week
Smart Grid lacks smart security
March 24
Government Computer News
Smart Grid will only be as good as security behind it
March 24
Greener Computing
Beware: Smart Grid May be hacker's paradise
March 23
Tech News World
Security holes could wreak havoc in proposed Smart Grid
March 23
SC Magazine
Insecure smart grid technology could result in utility attacks
March 23
CBC News
Smarter, greener technology begets high-tech risks
March 23
Network World Middle East
Power grid is found susceptible to cyberattack
March 21
CNET News
Smart grid hackers could cause blackouts
January 16
Internet News
What's the Mac OSX's Best Security Feature?

News Archives

Archived news items can be accessed here.


 
greybar

More Information


Need more information?
Contact IOActive today.



IOActive Profile:
Established: 1998
Headquarters: Seattle, WA and London, UK
Privately held and self-funded
 
IOActive Services:
Application Security, SCADA and Smart Grid, PCI and Compliance, Security Development Lifecycle, Infrastructure Audit, Incident Response and Training.
 
Customers:
Global 500 companies including power and utility, game, hardware, retail, financial, media, travel, aerospace, healthcare, high-tech, social networking, and software development organizations.