Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …

I switched to Windows 11 – have you? Here is the security and privacy case for switching.

Windows 11

Time to make a coffee and have a look at Windows 11 and what Microsoft is doing to protect your work and organisations. The first article is by Microsoft – so treat it as such – but it does lay out clearly the aims and objectives of the operating system …

TLS certificates are what internet trust is built on

Russia has created it’s own TLS certificate organisation and has started issuing these security and trust certificates to Russian sites, who can no longer access issuing authorities outside of the country, because of sanctions. Moscow to issue TLS certificates to Russian websites • The Register