Anandtech reports here on the decision by GlobalFoundries to stop development of their 7 nm process.
Two-Stage Attack on BMW
Medium.com reports here on a two-stage attack on a BMW: the first stage disables the alarm system; the second stage, which happens later, takes advantage of the broken alarm system to steal the car.
Foreshadow and Digital Rights Management
Extremetech reports here on the Foreshadow vulnerabilities and their relationship to digital rights management (DRM), particularly for 4K video.
Fifteenth Anniversary of Northeast Blackout
Extremetech reports here on the 15th anniversary of the Northeastern U. S. blackout of 2003 which was, as they report, initiated by a software bug.
Washington Post Article on IoT Security
The Washington Post writes here on IoT security based on a recent visit to Black Hat. A tip of the hat to Howard Shrobe of MIT for the pointer.