An attacker compromised popular Javascript code library ESLint’s submodule using a valid npm maintainer’s account to steal approximately 4,500 log in credentials, which can be used to compromise other developers’ Javascript projects.
Researchers found US-based traffic systems vulnerable to data spoofing attacks, where smart intersections are tricked into indirectly causing traffic slowdowns.
For National Cybersecurity Awareness month, we take a deeper look at cybercrime scenes from recent movies and see if they’re based on fact or purely fiction.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.
A security informatics team in John Hopkins University has raised concerns over the security of drones (unmanned aerial vehicles or UAVs) after it hijacked one and sent it crashing.