A new report released by the Institution of Engineering and Technology (IET) says holes in the software used to power driverless cars will most likely exist for malicious individuals to exploit for their own purposes, such as steal cars, cause traffic to stall, or maneuver them remotely so that they crash into other vehicles, structures and pedestrians on the street….
Tags » Cyber Attack
In the run-up to the recent election, there were many discussions of issues like the Islamic State in Iraq and Syria (ISIS), immigration, the Ebola virus and the Keystone XL pipeline, just to name a few. 87 more words
So you’re at your favorite coffee shop and have hopped on to the free WiFi with your tablet to check your social networks, read the latest news, and maybe take a quick peek at your bank balance while you’re enjoying your latte. 46 more words
China and probably “one or two” other countries have the capacity to use a cyber attack and shut down the entire United States power grid, a catastrophe that could lead to significant loss of life, NSA Director Michael Rogers told a House panel Thursday. 230 more words
The scourge of Scamville: Romanian town is the cyber-crime capital of the world - where hundreds of fraudsters rake in millions from gullible online shoppers
Râmnicu Vâlcea has a booming cyber-crime industry with more than 100 gangs operating in the town of 127,000 people.
The bulk of scams are fraudsters offering fake goods for sale to online shoppers around the world, including the U.S., on websites like eBay. 39 more words
Mobile security firm Lookout warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords. 117 more words