Elon Musk confirms that attempted Russian ransomware attack was aimed at Tesla

Multiple automotive-focused blogs suggested the Sparks-based Tesla was a target.

transportation news

3 strategies for addressing sensitive legal cybersecurity issues

by Charles J. Nerko, Daniella Casseres • 2 months ago

In this op-ed, two expert attorneys gives some advice on how to keep cyber risks from turning into legal risks.

European police bust Polish gang suspected of hacking and stealing cars

by Sean Lyngaas • 3 months ago

It's the latest evidence of how digitally connected cars open up new pathways for theft.

Fixing supply chain vulnerabilities should be a team effort

by Ellen Sundra • 3 months ago

Over time, the hope is that we can start building connected devices with a security-first approach.

How spies used LinkedIn to hack European defense companies

by Sean Lyngaas • 4 months ago

It's a cautionary tale in the use of social engineering for espionage.

Computer network ‘disruption’ forces Honda to cancel some production

by Sean Lyngaas • 4 months ago

Honda IT personnel are still working the incident. Outside analysts suspect ransomware.

Trust us, information sharing can work. Here’s how we’re doing it.

by Neil Jenkins • 5 months ago

Opinion: Why is information sharing so hard and why are we still working on it? The Cyber Threat Alliance has some ideas.

EasyJet announces breach impacting 9 million people

by Jeff Stone • 5 months ago

Emails and password credentials lifted in prior breaches still are a popular hacking technique.

500,000 victims pummeled in multi-stage BitBucket malware scheme

by Shannon Vavra • 9 months ago

The number of malware types deployed is "unprecedented," according to Cybereason.

Duo CEO Dug Song: We have to make security simple

by Greg Otto • 9 months ago

"We need to re-design our security experiences and workflows into things that can easily be adopted by users," Song says. "Because if there’s friction, they will find a different path."

Cybersecurity’s warranty challenge

by Ellen Sundra • 10 months ago

Enterprises are facing a tough choice: patch a system and break a warranty or leave a vulnerability to be fixed by an equipment manufacturer?

TwitterFacebookLinkedInRedditGoogle Gmail