(get it in RSS or Atom)

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Two renowned security researchers have discovered a way to remotely hack into and take over a Jeep Cherokee, controlling the brakes and accelerator as well as other components.

SCADA programmers? It's time for security by default! 60 Sec Security [VIDEO]

Here's the latest episode of our weekly 60-second security video.

Enjoy the news in just one minute...

"Cheaper car insurance" dongle could lead to a privacy wreck


You'd hope that the developers of a dongle that tracks your driving paid a lot of attention to computer security.

Or, in fact, any attention at all...

SSCC 179 - What kind of a name is "Lizard Squad"? [PODCAST]

Here's the latest episode of our regular security podcast.

This week: phishing, spamming, zombification, SCADA and the Internet of Things, and the curiously named cybervandals that go by "Lizard Squad."

South Korea concocting Stuxnet-like virus to infect enemies

South Korea concocting Stuxnet-like virus to infect enemies

Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu.

Monday review: the hot 24 stories of the week

Monday review: the hot 24 stories of the week

Here you go.

All the stories we wrote in the past seven days, in case you missed anything (or just want to read them again).

Hackers pwn the sun - Exploit code released for software used to manage solar energy plants

Hackers p4wn the sun: release exploit code for photovoltaic system software

The US Department of Homeland Security has issued an alert that hackers have released proof of concept exploit code for vulnerabilities in a common SCADA software package used to manage solar energy systems.

Chinese hackers linked to breach of control systems used in electric grids

How to protect your critical infrastructure

Telvent tells customers that it's discovered that attackers breached its internal firewall and security systems, implanted malicious software, and stolen project files linked to its smart grid product. Experts detected digital fingerprints implicating a Chinese hacking group.

Is Digital Pearl Harbor THE most tasteless term in IT security?

Digital Pearl Harbor?

Can hackers really cause as much bloodshed as 353 Imperial Japanese Navy fighters, bombers and torpedo planes launched from six aircraft carriers?

Can hackers really kill 2,402 U.S. citizens, leave 1,282 wounded, lose 65 of their own attackers in the process, and plunge the United States into a World War?

FBI acknowledges more SCADA attacks, increases cyber budget


The FBI acknowledged hackers have penetrated at least 3 US cities SCADA systems, one of them "major". The FBI is receiving a 12% budget increase for Cyber, but claims the division will double in size this year.

FLAMING RETORT: Putting out the HP printer fires


Smoke and fire certainly make good hacking headlines.

But there's a lot more to the flaming war of words between Columbia University and HP than potential pyro printer problems.

Paul Ducklin weighs into the debate.

SSCC 77 - Thanksgiving patching, SCADA, Google WiFi mapping and Android security

Sophos Security Chet Chat

Paul Ducklin joins Chet to talk about this week's news including giving your friends and family a hand at Thanksgiving, Android security, SCADA hacking and Google's WiFi mapping opt-out scheme.

Interview with SCADA hacker pr0f about the state of infrastructure security

Goatse hacker pleads guilty to stealing iPad user data

After writing about the hacking of SCADA systems I was contacted by one of the hackers, pr0f. I interviewed him via email to get his thoughts on how secure our critical infrastructure really is.

US SCADA infrastructure woefully unprotected


An attack that allegedly destroyed a pump at a municipal water processing facility has raised alarms about the security of critical infrastructure in the United States.

Duqu, son of Stuxnet raises questions of origin and intent


Reports have emerged suggesting a new piece of malware derived from Stuxnet has been reused to perform information gathering. Find out what we know and the links to the infamous Stuxnet worm.

September roundup - "90 Second News"


Don't just read the latest computer security news - watch it in 90 seconds! This month: when internet access chose the government; Adobe battles another zero-day; Twitter suffers XSS woes; and the Stuxnet malware keeps on making the wrong headlines. Read more…

Black Hat 2010 – Malware? SCADA? Privacy? Cloud?

Default image

Thousands of international security experts are congregating in Nevada, USA, for the Black Hat 2010 conference. But why? What is the single biggest issue which the 2010 conference will address? Is it malware? SCADA? Privacy? Cloud? Hear from the experts Read more…

Yes, there's malware. But don't change your SCADA password, advises Siemens

Yes, there's malware. But don't change your SCADA password, advises Siemens

If you were in charge of some critical infrastructure (such as a power plant or manufacturing facility) and there was some malware which exploited a zero-day vulnerability in Windows which targeted your systems you might be pretty concerned, right? In Read more…