Tags » Cyber Attack

Driverless Cars Vulnerable to Hacking, Possible Use in Terror Attack

A new report released by the Institution of Engineering and Technology (IET) says holes in the software used to power driverless cars will most likely exist for malicious individuals to exploit for their own purposes, such as steal cars, cause traffic to stall, or maneuver them remotely so that they crash into other vehicles, structures and pedestrians on the street….

READ MORE

Hacking

Cybersecurity was missing in action on Election Day

In the run-up to the recent election, there were many discussions of issues like the Islamic State in Iraq and Syria (ISIS), immigration, the Ebola virus and the Keystone XL pipeline, just to name a few. 87 more words

Hacking

How to Protect Your Privacy on Public WiFi Networks

So you’re at your favorite coffee shop and have hopped on to the free WiFi with your tablet to check your social networks, read the latest news, and maybe take a quick peek at your bank balance while you’re enjoying your latte. 46 more words

Cyber Attack

Is China Preparing To Take Down The U.S. Power Grid?

By  Off The Grid News Staff  – Off The Grid News

China and probably “one or two” other countries have the capacity to use a cyber attack and shut down the entire United States power grid, a catastrophe that could lead to significant loss of life, NSA Director Michael Rogers told a House panel Thursday. 230 more words

News/ Current Events

The scourge of Scamville: Romanian town is the cyber-crime capital of the world - where hundreds of fraudsters rake in millions from gullible online shoppers

Râmnicu Vâlcea has a booming cyber-crime industry with more than 100 gangs operating in the town of 127,000 people.

The bulk of scams are fraudsters offering fake goods for sale to online shoppers around the world, including the U.S., on websites like eBay. 39 more words

Hacking

Happy Hour Virus

Although, this idea is not quite compatible with our efforts to fight the unprecedented economic crisis, we cannot neglect or ignore its originality and brilliance. So, what is this app all about? 196 more words

Hackers turning Android smartphones & tablets into slave armies

Mobile security firm Lookout warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords. 117 more words

Hacking