Indian nuclear power plant’s network was hacked, officials confirm - Ars Technica
After initial denial, company says report of “malware in system” is correct
After initial denial, company says report of “malware in system” is correct
https://www.nytimes.com/2019/10/22/technology/china-hackers-ethnic-minorities.html
showing a new determination by Beijing to push its surveillance state beyond its borders.
Japanese hotel chain HIS Group has apologised for ignoring warnings that its in-room robots were hackable to allow pervs to remotely view video footage from the devices.
The report, which also included input from the Department of Foreign Affairs, recommended keeping the findings secret in order to avoid disrupting trade relations with Beijing
https://pxlnv.com/blog/dont-speak/
The more I’ve thought about Apple’s statement regarding the iOS exploit chains discovered last week, the more bizarre it seems
https://www.wired.com/story/ios-attack-watering-hole-project-zero/
the biggest known iPhone hacking incident of all time.
The hackers still made some strangely amateurish mistakes
https://www.wired.com/story/hackers-steal-tesla-model-s-key-fob-encryption/
The same researchers who figured out how to clone a Tesla Model S key fob have done it again, cracking the replacement that was meant to fix the problem.
https://freedom-to-tinker.com/2019/08/23/deconstructing-googles-excuses-on-tracking-protection/
If an ad uses deeply personal information to appeal to emotional vulnerabilities or exploits psychological tendencies to generate a purchase, then that is a form of privacy violation—regardless of the technical details.
https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/
an attacker in close proximity (WiFi), or an attacker who already hijacked our PC (USB), can also propagate to and infect our beloved cameras with malware