How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Vulnerabilities’
Most Recent
Read More
August 10, 2016

Whitepaper: Cybersecurity Risk for Connected Cars

A whitepaper has unveiled that design flaws could allow hackers to take control of connected vehicles.

The cybersecurity division of IOActive reported in the whitepaper that 50 percent of cyber vulnerabilities discovered in manufacturer designs have the potential to be exploited. Furthermore, 71 percent of the vulnerabilities listed could be operated without any difficulty, according to Business Cloud.

Three years’ worth of data and active vulnerabilities were looked at and detailed in the ‘Commonalities in Vehicle Vulnerabilities’ whitepaper.

The research found that hackers could target vehicles through technologies such as Vehicle to Vehicle [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University