Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …
Cyber Security and Paper!
I have just published an article over on our online training site, CyberAwake, about how you start a cyber security review and then how paper becomes a significant step in that process: Where are the boundaries for your cyber security? – CyberAwake
I read this article from the BBC and I immediately sent this email…
We work hard to keep our cyber security as tight as possible, and when we see a hole in it, we act quickly. I do not want a security leak because of a passing social media fad – so when I read this post from the BBC, I stopped writing …
Continue reading “I read this article from the BBC and I immediately sent this email…”
Air gapping – not as secure as you think – enter Gairoscope and EtherLED
I have reported on other air gap exploits by Mordechai Guri, from Ben-Gurion University in Israel – here are two more ways that the secure air gapped system can be exploited: GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes (arxiv.org) ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via …
Continue reading “Air gapping – not as secure as you think – enter Gairoscope and EtherLED”
NHS cyber-attack effectively contained
News of these issues with the National Health Service (NHS) broke yesterday, but I decided to wait for the speculation to die down before reporting on something as important as an essential service we all rely on. The cyber incident impacted the NHS 111 service – not the emergency 999 …