www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T21:35:58+00:00 www.secnews.physaphae.fr Bleeping Computer - Magazine Américain Cracked Tesla 3 Windshield Leads to $10,000 Bug Bounty 2019-07-17T03:33:03+00:00 https://www.bleepingcomputer.com/news/security/cracked-tesla-3-windshield-leads-to-10-000-bug-bounty/ www.secnews.physaphae.fr/article.php?IdArticle=1210888 False Vulnerability Tesla None ZD Net - Magazine Info Hackers reveal how to trick a Tesla into steering towards oncoming traffic 2019-04-02T11:55:05+00:00 https://www.zdnet.com/article/hackers-reveal-how-to-trick-a-tesla-into-steering-towards-oncoming-traffic/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1087463 False Vulnerability Tesla None We Live Security - Editeur Logiciel Antivirus ESET Two white hats hack a Tesla, get to keep it The electric automaker is working to release a fix for the underlying vulnerability in a matter of days ]]> 2019-03-25T15:47:01+00:00 https://www.welivesecurity.com/2019/03/25/white-hats-hack-tesla-keep/ www.secnews.physaphae.fr/article.php?IdArticle=1080843 False Hack,Vulnerability Tesla None InformationSecurityBuzzNews - Site de News Securite Tesla\'s Remote Fix For Its Model S Key Fob Vulnerability Is A Positive Sign For The Auto Industry Tesla’s Remote Fix For Its Model S Key Fob Vulnerability Is A Positive Sign For The Auto Industry]]> 2018-09-13T13:30:01+00:00 https://www.informationsecuritybuzz.com/expert-comments/teslas-remote-fix-for-its-model-s/ www.secnews.physaphae.fr/article.php?IdArticle=807877 False Vulnerability Tesla None IT Security Guru - Blog Sécurité A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment 2018-09-11T11:30:03+00:00 http://www.itsecurityguru.org/2018/09/11/group-researchers-showed-tesla-model-s-can-hacked-stolen-seconds-using-600-worth-equipment/ www.secnews.physaphae.fr/article.php?IdArticle=802909 False Vulnerability Tesla None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Things I Hearted this Week, 22nd June 2018 The Tesla Insider Elon Musk sent out an email stating an employee had stabbed the company in the back like Brutus, changing production code, and leaking inside information. I'll admit that like many people who have talked about or written about insider threats in the past, I instinctively punched the air and yelled, "YES! I warned you but you didn't listen." The incident is also notable for the impact it had on the company's  share price which dropped more than 6% in trading. "I was dismayed to learn this weekend about a Tesla employee who had conducted quite extensive and damaging sabotage to our operations, this included making direct code changes to the Tesla Manufacturing Operating System under false usernames and exporting large amounts of highly sensitive Tesla data to unknown third parties." Insider threats defined | AlienVault Tesla hit by insider saboteur who changed code, exfiltrated data | SC Magazine Tesla sinks after Elon Musk says an employee conducted 'sabotage' and Trump ramps up fears of a trade war (TSLA) | Business Insider Can't Fix Won't Fix, Don't Fix Organisations cannot afford to view penetration testing as a tick box exercise. How should they mitigate the fact some vulnerabilities can’t be fixed, won’t be fixed, and in some instances, actually shouldn’t be fixed? Can’t fix, won’t fix, don’t fix: Is it time for businesses to rethink how they action pen test results?| IT Pro Portal On the topic of pen tests, check out Adrian Sanabria's presentation slides from RSA earlier this year on killing the pen test. It's time to kill the pen test (PDF) | RSAconference To add balance, and to convince you pen testers out there that I'm not a bad person who hates all pen testers, here's an awesome collection of penetration testing resources that include tools, online resources, books, courses, conferences, magazine... Awesome Penetration Testing | Kinimiwar, GitHub A Case Study In Bad Disclosure Imagine you're a researcher and have found a vulnerability, you then disclose it responsibly to a vendor, then that vendor fixes the issue - but instead of sending the chopper over to you with a care package, they pretend like you didn't exist. Akin to Tom Cruise getting disavowed in every single Mission Impossible movie. Then imagine that vendor submitted the vulnerability details to Google and received a bug bounty award to the tune of $5,000. Then to top it off, they sat back in a massive reclining chair, threw their head back and laughed as they donated the full $5,000 to a good cause. ]]> 2018-06-22T13:00:00+00:00 http://feeds.feedblitz.com/~/557751908/0/alienvault-blogs~Things-I-Hearted-this-Week-nd-June www.secnews.physaphae.fr/article.php?IdArticle=740333 False Hack,Vulnerability,Guideline Tesla,Tesla,Bithumb None