Medium.com reports here on a two-stage attack on a BMW: the first stage disables the alarm system; the second stage, which happens later, takes advantage of the broken alarm system to steal the car.
Extremetech reports here on the Foreshadow vulnerabilities and their relationship to digital rights management (DRM), particularly for 4K video.
Extremetech reports here on the 15th anniversary of the Northeastern U. S. blackout of 2003 which was, as they report, initiated by a software bug.
The Washington Post writes here on IoT security based on a recent visit to Black Hat. A tip of the hat to Howard Shrobe of MIT for the pointer.
Tom’s Hardware reports here on a talk at Black Hat which describes an undocumented God Mode on VIA C3 Nehemiah chips.