Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …

What can a hacker do? Swap your BTC address for theirs, when you copy and paste!

crypto-currencies bitcoin

If you do not know what a BTC address is then this this particular demonstration of of a Python hack will not impact you. If you do use bitcoin or other cryptocurrency then have a look at this SANS blog by Xme: Multi-Cryptocurrency Clipboard Swapper – SANS Internet Storm Centre …