Medium.com reports here on a two-stage attack on a BMW: the first stage disables the alarm system; the second stage, which happens later, takes advantage of the broken alarm system to steal the car.
Month: August 2018
Foreshadow and Digital Rights Management
Extremetech reports here on the Foreshadow vulnerabilities and their relationship to digital rights management (DRM), particularly for 4K video.
Fifteenth Anniversary of Northeast Blackout
Extremetech reports here on the 15th anniversary of the Northeastern U. S. blackout of 2003 which was, as they report, initiated by a software bug.
Washington Post Article on IoT Security
The Washington Post writes here on IoT security based on a recent visit to Black Hat. A tip of the hat to Howard Shrobe of MIT for the pointer.
Undocumented God Mode on some x86 Chips
Tom’s Hardware reports here on a talk at Black Hat which describes an undocumented God Mode on VIA C3 Nehemiah chips.