Security
Headlines
HeadlinesLatestCVEs

Source

Wired

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.

Wired
#vulnerability#ios#git#auth
How a Saxophonist Tricked the KGB by Encrypting Secrets in Music

Using a custom encryption scheme within music notation, Merryl Goldberg and three other US musicians slipped information to Soviet performers and activists known as the Phantom Orchestra.

How a Saxophonist Tricked the KGB by Encrypting Secrets in Music

Using a custom encryption scheme within music notation, Merryl Goldberg and three other US musicians slipped information to Soviet performers and activists known as the Phantom Orchestra.

Disinfo and Hate Speech Flood TikTok Ahead of Kenya’s Elections

Mozilla researchers identified accounts with millions of view spreading hate speech and disinformation

Disinfo and Hate Speech Flood TikTok Ahead of Kenya’s Elections

Mozilla researchers identified accounts with millions of view spreading hate speech and disinformation

Apple Just Killed the Password—for Real This Time

Apple’s iOS 16 and macOS Ventura will introduce passwordless login for apps and websites. It’s only the beginning.

Apple Just Killed the Password—for Real This Time

Apple’s iOS 16 and macOS Ventura will introduce passwordless login for apps and websites. It’s only the beginning.

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.

Period-Tracking and Fertility Apps Can Put Women Seeking Abortions at Risk

Apps collect sensitive data that could be subpoenaed by law enforcement or sold by data brokers.