What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.webp 2018-09-21 16:26:05 Malware Disguised as Job Offers Distributed on Freelance Sites (lien direct) Attackers are using freelance job sites such as fiverr and Freelancer to distribute malware disguised as job offers. These job offers contain attachments that pretends to be the job brief, but are actually installers for keyloggers such as Agent Tesla or Remote Access Trojan (RATs). [...] Malware Tesla
WiredThreatLevel.webp 2018-09-20 11:00:00 Porsche\'s Sleek Chargers Will Power up EVs in Just 15 Minutes (lien direct) The German automaker's “electric pit stops” promise to put 250 miles of range on the Taycan's batteries nearly three times faster than a Tesla Supercharger. Tesla
WiredThreatLevel.webp 2018-09-18 23:15:05 A DOJ Probe Into Elon\'s Tweets Could Spell Yet More Trouble for Tesla (lien direct) The reported criminal probe is likely in its early stages, but darkens an already gloomy sky gathering over Elon Musk's automaker. Tesla
WiredThreatLevel.webp 2018-09-18 12:00:00 How Audi\'s Electric E-tron SUV Stacks Up to Its Competitors (lien direct) From kilowatt-hours to horsepower to acceleration times, see how the E-tron SUV compares to similar offerings from Tesla, Mercedes-Benz, Jaguar, and others. Tesla
WiredThreatLevel.webp 2018-09-18 04:00:00 Audi at Last Unveils the E-Tron, Its First All-Electric SUV (lien direct) Starting at $74,500 and offering 248(ish) miles of range, the E-Tron is here to do battle with Tesla and every other automaker crowding into the luxury electric market. Tesla
WiredThreatLevel.webp 2018-09-16 17:12:01 Evacuating for Florence, Tesla\'s Security Flaw, and More in This Week in Cars (lien direct) Plus: flying cars get hooked up, BMW and Mercedes show off new concepts, and Waze makes Chicago more navigable. Tesla
AlienVault.webp 2018-09-14 13:00:00 Things I Hearted this Week, 14th September 2018 (lien direct) With everything that keeps going on in the world of security, and the world at large, most eyes were focused on Tim Cook as he and his merry men took to the stage and announce the latest and greatest in Apple technology. There didn’t seem to be anything totally mind-blowing on the phone end. Just looked to be more bigger, faster, and powerful versions of the iPhones at eye-watering prices. The Apple watch now has a built-in FDA-approved ECG heart monitor. Which is pretty cool as an early-warning system that a stroke is imminent - I assume to allow you to take some smart HDR selfies, apply the correct filters, and post to Instagram before you collapse. But enough about that, let’s get down to business. British Airways Breached BA suffered a rather large breach which included payment information (including CVV) and personal details. While the investigation is ongoing, some security experts believe the breach was caused due to malicious code being injected into one of the external scripts in its payment systems. British Airways hack: Infosec experts finger third-party scripts on payment pages | The Register As an affected customer, I accept that companies get breached. But the advice seemed pretty poor. British Airways breached | J4vv4D Boards need to get more technical - NCSC The government is calling on business leaders to take responsibility for their organisations’ cyber security, as the threat from nation state hackers and cyber criminal gangs continues to rise. Ciaran Martin, head of NCSC believes that cybersecurity is a mainstream business risk and that corporate leaders need to understand what threats are out there, and what are the most effective ways of managing the risks. They need to understand cyber risk in the same way they understand financial risk, or health and safety risk. NCSC issues new advice for business leaders as Ciaran Martin admits previous guidance was “unhelpful” | New Statesman Hunting in O365 logs Cloud is great, but sometimes making sense of the logs can be a pain. If you’re struggling with O365 logs, then this document could be really useful. Detailed properties in the Office 365 audit log | Microsoft GCHQ data collection violated human rights, Strasbourg court rules GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment. But the Strasbourg court found that GCHQ’s regime for sharing sensitive digital intelligence with foreign governments was not illegal. It is the first major challenge to the legality of UK intelligence agencies intercepting private communications in bulk, following Edward Snowden’s whistleblowing revelations. GCHQ data collection violated human rights, Strasbourg court r Data Breach Threat Guideline Tesla
no_ico.webp 2018-09-13 13:30:01 Tesla\'s Remote Fix For Its Model S Key Fob Vulnerability Is A Positive Sign For The Auto Industry (lien direct) Tesla Model S key fob system is vulnerable to spoofing attacks, Craig Smith, Rapid7's research director of transportation security, commented below on this report. According to reports, researchers identified a flaw which would allow attackers to steal a Tesla simply by walking past the owner and cloning his/her key. The malicious actor would have to first identify the … The ISBuzz Post: This Post Tesla’s Remote Fix For Its Model S Key Fob Vulnerability Is A Positive Sign For The Auto Industry Vulnerability Tesla
CSO.webp 2018-09-12 07:31:00 Hackers clone Tesla Model S key fob in 2 seconds to steal car (lien direct) Feeling reckless and looking for something new to do with your Raspberry Pi? Using a Raspberry Pi 3 Model B+, Proxmark3, Yard Stick One, and a USB battery pack, Belgium researchers needed less than two seconds to clone the key fob of a Tesla Model S. The reckless part comes into play if you were to actually steal the Tesla, but if you turn to a life of crime then the researchers believe McLaren, Karma and Triumph are vulnerable to the attack as well since, like Tesla, the keyless entry solutions for those vehicles are designed by Pektron. In case it's not clear that stealing a Model S was a joke, then don't try it cause Tesla would be able to track down the vehicle even if you disabled GPS. Tesla
The_Hackers_News.webp 2018-09-12 06:48:00 Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars (lien direct) Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds. Yes, you heard that right. A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group of the Department of Electrical Hack Tesla
SecurityAffairs.webp 2018-09-12 05:02:04 Researchers show how to clone Tesla S Key Fobs in a few seconds (lien direct) Researchers demonstrated that it is possible to rapidly clone the wireless key fob of the expensive Tesla Model S and possibly other vehicles. The team of experts COSIC research group at the KU Leuven University in Belgium has devised a new relay attack against the Passive Keyless Entry and Start (PKES) system that is used by many cars […] Tesla
AlienVault.webp 2018-09-11 13:00:00 Explain Cryptojacking to Me (lien direct) Last year, I wrote that ransomware was the summer anthem of 2017. At the time, it seemed impossible that the onslaught of global ransomware attacks like WannaCry and NotPetya would ever wane. But, I should have known better. Every summertime anthem eventually gets overplayed. This year, cryptojacking took over the airwaves, fueled by volatile global cryptocurrency markets. In the first half of 2018, detected cryptojacking attacks increased 141%, outpacing ransomware attacks. In this blog post, I’ll address cryptojacking: what it is, how it works, how to detect it, and why you should be tuning into this type of threat. What is Cryptojacking? Crytojacking definition: Cryptojacking is the act of using another’s computational resources without their knowledge or permission for cryptomining activities. By cryptojacking mobile devices, laptops, and servers, attackers effectively steal the CPU of your device to mine for cryptocurrencies like Bitcoin and Monero. Whereas traditional malware attacks target sensitive data that can be exploited for financial gain, like social security numbers and credit card information, cybercriminals that launch cryptojacking campaigns are more interested in your device’s computing power than your own personal data. To understand why, it’s helpful to consider the economics of cryptocurrency mining. Mining for cryptocurrencies like Bitcoin and Monero takes some serious computing resources to solve the complex algorithms used to discover new coins. These resources are not cheap, as anyone who pays their organization’s AWS bill or data center utility bill can attest to. So, in order for cryptocurrency mining to be profitable and worthwhile, the market value of the cryptocurrency must be higher than the cost of mining it – that is, unless you can eliminate the resource costs altogether by stealing others’ resources to do the mining for you. That’s exactly what cryptojacking attacks aim to do, to silently turn millions of devices into cryptomining bots, enabling cybercriminals to turn a profit without all the effort and uncertainty of collecting a ransom. Often, cryptojacking attacks are designed to evade detection by traditional antivirus tools so that they can quietly run in the background of the machine. Does this mean that all cryptomining activity is malicious? Well, it depends on who you ask. Cryptomining vs. Cryptojacking As the cryptocurrency markets have gained value and become more mainstream in recent years, we’ve seen a digital gold rush to cryptomine for new Bitcoin, and more recently, Monero. What began with early adopters and hobbyists building home rigs to mine for new coins has now given way to an entire economy of mining as a service, cryptoming server farms, and even cryptomining cafes. In this sense, cryptomining is, more or less, considered a legal and legitimate activity, one that could be further legitimized by a rumored $12 Billion Bitman IPO. Yet, the lines between cryptomining and cryptojacking are blurry. For example, the cryptomining “startup” Coinhive has positioned its technology as an alternative way to monetize a website, instead of by serving ads or charging a subscription. According to the website, the folks behind Coinhive, “dream about it as an alternative to micropayments, artificial wait time in online games, intrusive ads and dubious marketing tactics.” Yet at the same time, Coinhive has been one of the most common culprits found Malware Threat NotPetya Wannacry Tesla
itsecurityguru.webp 2018-09-11 11:30:03 A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment (lien direct) A savvy car thief could drive off with a Tesla Model S by using just a few, relatively inexpensive pieces of computing hardware and some radios - at least, the thief could have until recently, when Tesla fixed an overlooked vulnerability in its cars’ security systems. View full story ORIGINAL SOURCE: Business Insider Vulnerability Tesla
ZDNet.webp 2018-09-11 09:28:00 How to steal a Tesla Model S in seconds (lien direct) An attack technique has been revealed which allows threat actors to unlock a Tesla vehicle in no time at all. Threat Tesla
ErrataRob.webp 2018-09-10 17:33:17 California\'s bad IoT law (lien direct) California has passed an IoT security bill, awaiting the government's signature/veto. It's a typically bad bill based on a superficial understanding of cybersecurity/hacking that will do little improve security, while doing a lot to impose costs and harm innovation.It's based on the misconception of adding security features. It's like dieting, where people insist you should eat more kale, which does little to address the problem you are pigging out on potato chips. The key to dieting is not eating more but eating less. The same is true of cybersecurity, where the point is not to add “security features” but to remove “insecure features”. For IoT devices, that means removing listening ports and cross-site/injection issues in web management. Adding features is typical “magic pill” or “silver bullet” thinking that we spend much of our time in infosec fighting against.We don't want arbitrary features like firewall and anti-virus added to these products. It'll just increase the attack surface making things worse. The one possible exception to this is “patchability”: some IoT devices can't be patched, and that is a problem. But even here, it's complicated. Even if IoT devices are patchable in theory there is no guarantee vendors will supply such patches, or worse, that users will apply them. Users overwhelmingly forget about devices once they are installed. These devices aren't like phones/laptops which notify users about patching.You might think a good solution to this is automated patching, but only if you ignore history. Many rate “NotPetya” as the worst, most costly, cyberattack ever. That was launched by subverting an automated patch. Most IoT devices exist behind firewalls, and are thus very difficult to hack. Automated patching gets beyond firewalls; it makes it much more likely mass infections will result from hackers targeting the vendor. The Mirai worm infected fewer than 200,000 devices. A hack of a tiny IoT vendor can gain control of more devices than that in one fell swoop.The bill does target one insecure feature that should be removed: hardcoded passwords. But they get the language wrong. A device doesn't have a single password, but many things that may or may not be called passwords. A typical IoT device has one system for creating accounts on the web management interface, a wholly separate authentication system for services like Telnet (based on /etc/passwd), and yet a wholly separate system for things like debugging interfaces. Just because a device does the proscribed thing of using a unique or user generated password in the user interface doesn't mean it doesn't also have a bug in Telnet.That was the problem with devices infected by Mirai. The description that these were hardcoded passwords is only a superficial understanding of the problem. The real problem was that there were different authentication systems in the web interface and in other services like Telnet. Most of the devices vulnerable to Mirai did the right thing on the web interfaces (meeting the language of this law) requiring the user to create new passwords before operating. They just did the wrong thing elsewhere.People aren't really paying attention to what happened with Mirai. They look at the 20 billion new IoT devices that are going to be connected to the Internet by 2020 and believe Mirai is just the tip of the iceberg. But it isn't. The IPv4 Internet has only 4 billion addresses, which are pretty much already used up. This means those 20 billion won't be exposed to the public Internet like Mirai devices, but hidden behind firewalls that translate addresses. Thus, rather than Mirai presaging the future, it represents the last gasp of the past that is unlikely to come again.This law is backwards looking rather than forward looking. Forward looking, by far the most important t Hack Threat Patching Guideline NotPetya Tesla
WiredThreatLevel.webp 2018-09-10 17:00:00 Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob (lien direct) Weak encryption in the cars' key fobs allows all-too-easy theft, but you can set a PIN code on your Tesla to protect it. Tesla
MalwarebytesLabs.webp 2018-09-10 16:44:05 A week in security (September 3 – 9) (lien direct) A roundup of the security news from September 3 – 9, including spyware going mainstream, Mac App Store apps stealing and abusing customer data, and Fortnite install concerns. Categories: Security world Week in security Tags: (Read more...) Wannacry Tesla
WiredThreatLevel.webp 2018-09-09 13:00:00 This Week in the Future of Cars: What Happened at Tesla, Uber, and Chevy this week (lien direct) Elon Musk is smoking something, doppler lidar helps cars see better, and the Diplomatic Security Service braves Ebola Uber Tesla
WiredThreatLevel.webp 2018-09-07 20:21:01 Elon Musk\'s Weed-Toking Goodwill Tour Isn\'t Enough to Save Tesla (lien direct) As more high-level executives leave, investors aren't calmed by Musk's attempt to return to his far-out thinking self on Joe Rogan's podcast. Tesla
WiredThreatLevel.webp 2018-09-07 07:12:03 Ousting Elon Musk From Tesla Will Take More Than Lawsuits and Twitter Fights (lien direct) Wild tweets, an inquisitive SEC, fights with reporters-none of it's anywhere close to ending Musk's control of the electric automaker. Tesla
ZDNet.webp 2018-09-06 17:32:02 Tesla modifies product policy to accommodate "good-faith" security research (lien direct) Tesla promises to reset car firmware and software damaged during security research. Also promises not to go after "good-faith" researchers in court. Tesla
bleepingcomputer.webp 2018-09-06 11:49:00 Tesla Will Restore Car Firmware/OS When Hacking Goes Wrong (lien direct) Tesla recently added to its responsible disclosure guidelines with clarifications that welcome researchers to probe software in its cars for security bugs. [...] Tesla
WiredThreatLevel.webp 2018-09-04 18:19:00 Mercedes Challenges Tesla With the All-Electric EQC SUV (lien direct) The battery-powered EQC makes yet more competition for Elon Musk's luxury market dominance. Tesla
WiredThreatLevel.webp 2018-09-02 11:00:00 Uber, Tesla, Electric Scooters, and More Folks Who Made Car News This Week (lien direct) Plus, a startup hoping to hasten the arrival of self-driving, flying cars. Uber Tesla ★★★
WiredThreatLevel.webp 2018-08-31 16:00:00 Top Stories in August: Elon Musk\'s Summertime Madness (lien direct) The Tesla CEO's month was quite eventful. Plus: The untold story of how a single line of code crashed the world. Tesla
WiredThreatLevel.webp 2018-08-31 11:00:00 Here\'s How Fast That Jumping Tesla Was Traveling (lien direct) A Tesla was caught on video going airborne after blasting over railroad tracks. Here's how to estimate its speed. Tesla
WiredThreatLevel.webp 2018-08-29 21:31:05 A Brief History of Elon Musk\'s Market-Moving Tweets (lien direct) Tesla stocks are down following the CEO's revival of his "pedo guy" claim-not the first time Musk's taste for Twitter has changed how investors see his company. Tesla
WiredThreatLevel.webp 2018-08-28 10:00:00 Keeping Tesla Public Won\'t Save Elon Musk From the SEC-or Angry Investors (lien direct) The decision not to take his automaker private doesn't do much to shield the CEO from a reported SEC investigation, and shareholders who say his unexpected tweet cost them money. Tesla ★★★★★
WiredThreatLevel.webp 2018-08-27 19:27:00 Why Tesla\'s Autopilot Can\'t See a Stopped Firetruck (lien direct) Semi-autonomous driving systems are designed to ignore unmoving obstacles because otherwise, they couldn't work at all. Tesla ★★★
WiredThreatLevel.webp 2018-08-26 13:00:00 Tesla\'s Legal Woes, Bugatti\'s Insane Supercar, and More Car News (lien direct) Plus, an advanced Porsche 911, and why San Francisco's new $2 billion transit terminal doesn't tick all the boxes. Tesla
no_ico.webp 2018-08-20 18:27:03 Elon Musk Announces Tesla Will Share Security Software With Other Car Makers As Open Source (lien direct) It has been reported that Elon Musk told hackers at the private DEF CON conference last week that Tesla will share its security software with other car makers as open source. He says it’s a bid to make autonomous vehicle software safer by opening the software to more scrutiny, according to people who attended the gathering. IT … The ISBuzz Post: This Post Elon Musk Announces Tesla Will Share Security Software With Other Car Makers As Open Source Tesla
WiredThreatLevel.webp 2018-08-19 13:00:00 This Week in Cars: Elon Musk and the Future of Tesla (lien direct) As Elon Musk draws the wrath of investors and maybe the SEC, whither Tesla? Plus, the Boring Company heads to LA, and Alphabet's Sidewalk Labs tries to rethink the future of cities. Tesla
WiredThreatLevel.webp 2018-08-17 19:41:00 Gadget Lab Podcast: Will Elon Musk Really Take Tesla Private? (lien direct) Elon Musk's public and sometimes-controversial tweets have triggered a cascade of events in recent weeks. We discuss on the Gadget Lab podcast. Tesla ★★★★★
WiredThreatLevel.webp 2018-08-12 13:00:00 Elon Musk\'s Tweets, Tesla Might Go Private, Uber Loses in NYC, and More Car News (lien direct) Plus, we chat with Kodiak Robotics, a new autonomous trucking startup, and Steve McQueen's Ford Mustang Bullitt is back. Uber Tesla
WiredThreatLevel.webp 2018-08-11 11:00:00 Details on Tesla Going Private Are a Little Clearer, But Not Much (lien direct) Elon Musk still has to prove he has the funding in place, and investors want to know where it's coming from. Tesla
Blog.webp 2018-08-10 00:04:00 Can Self Driving Cars Be Secured? Car Hacking Duo Isn\'t Sure (lien direct) Can consumer-owned self-driving cars like those being made by Tesla, BMW and Mercedes and others be secured from cyber attack? The hackers who famously commandeered a Jeep Cherokee using software attacks say they aren’t so sure.  Three years after putting the automotive industry on notice with their remote compromise of a Jeep Cherokee,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/563363548/0/thesecurityledger -->» Tesla
WiredThreatLevel.webp 2018-08-08 11:00:00 Semi-Autonomous Cars Have Flaws. That\'s Why They Need Tests (lien direct) The Insurance Institute for Highway Safety tested features in cars from Tesla, Mercedes, BMW, and Volvo, and found they all had issues. Here's where safety rankings would come in handy. Tesla
WiredThreatLevel.webp 2018-08-07 20:34:01 Can Elon Musk Really Take Tesla Private? (lien direct) The Tesla CEO tweeted he had secured funding for a buyout of the electric carmaker, and market madness ensured. Tesla
TechRepublic.webp 2018-08-06 19:23:01 Google Cloud adds support for Nvidia\'s Tesla P4 GPU (lien direct) The compute accelerator is optimized for graphics-intensive applications and machine learning inference. Tesla ★★★★★
SecurityWeek.webp 2018-08-06 17:14:01 Ex-Tesla Worker Accused of Hacking Seeks $1M in Counterclaim (lien direct) Tesla Breach Tesla ★★★★★
WiredThreatLevel.webp 2018-08-05 13:00:00 Elon Musk\'s Apology, Tesla\'s Quarter, Waymo\'s Transit Partner, and More Car News This Week (lien direct) Plus: Autopilot advances, and Sacramento goes for self-driving cars. Tesla
WiredThreatLevel.webp 2018-08-04 11:00:00 Tesla Says Its New Self-Driving Chip Is Finally Baked (lien direct) The car company says it developed its own computer chip, taking it one more step toward vertically integrating its autonomous driving technology. Tesla
WiredThreatLevel.webp 2018-08-03 13:00:00 Elon Musk Wants to Put an Arcade in Your Tesla, and the Rest of the Week in Games (lien direct) There's plenty to catch up on, including Valve remembering that they can actually make games. Tesla
WiredThreatLevel.webp 2018-08-01 23:51:03 Tesla Loses More Money Than Ever, But Says Profits Are Coming (lien direct) Today's investor call was low on Muskian braggadocio, delivered a little hater schadenfreude, and offered some reasonable promises. Tesla
TechRepublic.webp 2018-08-01 16:23:00 Tesla\'s Autopilot: Cheat sheet (lien direct) Everything you need to know about Tesla's onboard computer system and the company's plans for a self-driving car. Tesla
TechRepublic.webp 2018-07-31 18:17:04 Uber quits self-driving trucks, but the driverless semis are still coming (lien direct) Autonomous truck projects from Waymo and Tesla are poised to pick up speed now that Uber is out of the race, but worries remain over how the technology will impact jobs. Uber Tesla
AlienVault.webp 2018-07-27 13:00:00 Things I Hearted this Week, 27th July 2018 (lien direct) Welcome to your weekly security roundup, providing you all with the security news you deserve, but maybe might not need. As always, these news stories are human-curated by me - no fancy algorithms, no machine learning, and definitely no trending topics here. We are less than two weeks away from Blackhat in sunny Las Vegas. We’ll be there - pop along to booth 528 and say hello if you’re there. Google: Security Keys Neutralized Employee Phishing Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes. Google: Security Keys Neutralized Employee Phishing | Krebs on Security While we’re on the topic of phishing, attackers used phishing emails to break into a Virginia bank twice in eight months, making off with more than $2.4 million in total. Now the bank is suing its cybersecurity insurance provider for refusing to fully cover the loss. Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M | Krebs on Security We’re probably going to see more of this kind of back and forth as companies that have taken out cyber insurance and suffered a breach fight with their insurers over liability and who will cover the cost. Somewhat related: Scam of the week, another new CEO fraud phishing wrinkle | KnowBe4 Breaking the Chain Supply chain and third party risks are getting better understood, but understanding a risk doesn’t necessarily mean it will reduce the risk. Tesla, VW, and dozens of other car manufacturers had their sensitive information exposed due to a weak security link in their supply chains. Tesla, VW data was left exposed by supply chain vendor Level One Robotics | SC Magazine SIM Swap - A Victim’s Perspective This is a really good write-up by AntiSocial engineer taking a look at how SIM swap fraud can impact victims, and why mobile phone operators need to do more to prevent this kind of fraud. “It’s an all too common story, the signal bars disappear from your mobile phone, you ring the phone number – it rings, but it’s not your phone ringing. Chaos ensues. You’re now getting password reset emails from Facebook and Google. You try to login to your bank but your password fails.  Soon enough the emails stop coming as attackers reset your account passwords. You have just become the newest victim of SIM Swap Fraud and your phone number is now at the control of an unknown person.” SIM Swap Fraud - a victim’s perspective | AntiSocial Engineer EU Fails to Regulate IoT Security In this week’s head-scratching moment of “what were they thinking?”, the European Commission has rejected consumer groups' calls for mandatory security for consumer internet-connected devices because they believe voluntar Data Breach Hack Tesla
no_ico.webp 2018-07-25 11:33:05 Sensitive Data Exposed Belonging To Tesla, Toyota, VW And More (lien direct) News broke over the weekend that 157 gigabytes worth of sensitive documents for over a hundred manufacturing companies were exposed on a publicly accessible server belonging to Level One Robotics. 10 years of assembly line schematics, factory floor layouts, robotic configurations, employee driver's licences and more were exposed via a publicly accessible server.  The server was not … The ISBuzz Post: This Post Sensitive Data Exposed Belonging To Tesla, Toyota, VW And More Tesla
grahamcluley.webp 2018-07-25 10:34:04 Here\'s why Twitter will lock your account if you change your display name to Elon Musk (lien direct) Here's why Twitter will lock your account if you change your display name to Elon MuskThere's bad news if your name really is “Elon Musk”. You're going to have to jump over some additional hurdles to convince Twitter that you should be allowed to change your display name to the one you share with the boss of Tesla and SpaceX. Read more in my article on the Hot for Security blog. Tesla
WiredThreatLevel.webp 2018-07-22 12:00:00 Zoox vs. San Francisco, Good News for Tesla, and More Car News This Week (lien direct) Plus: BMW goes after Uber, robo-cars get new rule books, the dream of a solar-powered car, and more. Uber Tesla
Last update at: 2024-05-10 05:07:59
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter