Tesla is in the news again this week, but this time it has nothing to do with fires or Twitter or Elon Musk smoking weed. Instead, it’s because hackers figured out how to steal a Tesla Model S by cloning its key fob. WIRED’s resident car-hacking reporter Andy Greenberg broke that news, and explains why the attack might also work on cars from McLaren and Karma.

Kid-Focused Apps Track Location, UK Spying, and More Security News This Week

Lily Hay Newman has the behind-the-scenes story on how hackers got past British Airways defenses in August, plus an alarming report about how a decade-old technique can break the encryption of just about any computer. Yikes.

Former US Secretary of Defense Ash Carter wrote an op-ed in WIRED Friday arguing that big tech and the government have to find a way to work together or everyone will be screwed. And Trump introduced a new executive order aimed at election interference, but we explain why it’s more a bandaid than a cure.

Plenty of other things happened in the security world this week, too. As always, we’ve rounded up all the news we didn’t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.

Some Apps Geared Toward Kids Are Tracking Their Location

Data tracking is creepy. But data tracking children? Much worse. This week, New Mexico’s attorney general filed a lawsuit against Tiny Lab, an app developer behind games like Fun Kid Racing, as well as advertising companies including Google and Twitter, alleging that they violated children’s privacy laws by tracking and sharing data for users under the age of 13. When New York Times reporters looked at other apps aimed at young kids on both Google Android and Apple iOS, they found more examples that potentially violate privacy laws by sending children’s data to tracking companies. All of this might not surprise you. As the Times notes, it’s also in line with academic research that found thousands of Android games and apps for kids shared their data with outside companies in possible violation of the Children’s Online Privacy and Protection Act.

The State Department Is Less Secure Than WIRED’s Twitter Account

A bipartisan group of senators sent Secretary of State Mike Pompeo a letter this week asking him why on earth the State Department hasn’t instituted basic cybersecurity best practices. According to CNET, the senators are concerned that a recent inspection found only 11 percent of the department’s required devices have multi-factor authentication enabled. Which is crazy. Nation state hackers all over the world would love to get access to accounts and devices at State. The least American leaders could do to protect the country from prying eyes is follow some rudimentary security tips.

EU Law Would Fine Tech Firms if Terror Propaganda Isn’t Removed Fast Enough

A proposed law in the European Union would require social media platforms and tech companies to remove terror propaganda from their sites within one hour of it being reported to them. If they failed to do so, the companies would face fines up to 4 percent of their worldwide revenue, according to the Wall Street Journal. That would be, uh, a lot: for Alphabet, $4.43 billion; Facebook, $1.63 billion. EU member states still need to sign off, as does the parliament. In the meantime, social networks like Facebook and YouTube are working to improve their moderation systems. Last May, Facebook reported that in Q1 of 2018, nearly 100 percent of the terror-related content it removed had been flagged by the company before users reported it.

Google’s Sketchy Location Tracking Under Investigation in Arizona

Last month, the Associated Press reported that Google was still tracking you even after you turned off location tracking in Google Maps or on your Android device. (We explained how to go about actually turning it off.) People were outraged and felt misled. Now the Arizona attorney general is investigating the matter, according to the Washington Post.

UK Spying Practices Found in Violation of European Law

The European Court of Human Rights ruled on Thursday that the UK’s mass surveillance practices violated human rights law. Those practices came to light in 2013, when Edward Snowden revealed that intelligence agencies in the UK were collecting social media, messages, and phone calls, including people not under suspicion for any crimes. The court found that the program violated the right to privacy, according to Gizmodo, due to “insufficient oversight.”

Read More

Cybersecurity for Beginners

18 new from $17.94
12 used from $ 14.40
Free shipping
Set It Now
as of October 15, 2018 10:50 pm


AuthorRaef Meeuwisse
EAN ListEAN List Element: 9781911452034
Item DimensionsHeight: 900; Length: 600; Width: 51
LabelCyber Simplicity Ltd
ManufacturerCyber Simplicity Ltd
Number Of Items1
Number Of Pages224
Package DimensionsHeight: 55; Length: 890; Weight: 75; Width: 591
Product GroupBook
Product Type NameABIS_BOOK
Publication Date2017-03-14
PublisherCyber Simplicity Ltd
StudioCyber Simplicity Ltd
TitleCybersecurity for Beginners

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

13 new from $35.99
10 used from $ 30.75
Free shipping
Set It Now
as of October 15, 2018 10:50 pm


AuthorYuri Diogenes; Erdal Ozkaya
EAN ListEAN List Element: 9781788475297
Item DimensionsHeight: 925; Length: 750; Width: 87
LabelPackt Publishing - ebooks Account
ManufacturerPackt Publishing - ebooks Account
Number Of Items1
Number Of Pages384
Package DimensionsHeight: 79; Length: 921; Weight: 157; Width: 732
Product GroupBook
Product Type NameABIS_BOOK
Publication Date2018-01-30
PublisherPackt Publishing - ebooks Account
Release Date2018-01-30
StudioPackt Publishing - ebooks Account
TitleCybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Cybersecurity Law

23 new from $70.00
15 used from $ 59.95
Free shipping
Set It Now
as of October 15, 2018 10:50 pm


AuthorJeff Kosseff
EAN List9781119231509; 0001119231507
Is Eligible For Trade In1
Item DimensionsHeight: 920; Length: 610; Weight: 190; Width: 120
Number Of Pages528
Package DimensionsHeight: 118; Length: 953; Weight: 190; Width: 638
Package Quantity1
Product GroupBook
Product Type NameABIS_BOOK
Publication Date2017-02-28
TitleCybersecurity Law
UPC ListUPC List Element: 001119231507

Cybersecurity and Cyberwar: What Everyone Needs to Know

67 new from $6.00
87 used from $ 3.17
Free shipping
Set It Now
as of October 15, 2018 10:50 pm


  • Oxford University Press UK

Effective Cybersecurity: A Guide to Using Best Practices and Standards

4 new from $52.97
7 used from $ 49.94
Free shipping
Set It Now
as of October 15, 2018 10:50 pm


AuthorWilliam Stallings
EAN ListEAN List Element: 9780134772806
Item DimensionsHeight: 910; Length: 700; Width: 150
LabelAddison-Wesley Professional
ManufacturerAddison-Wesley Professional
Number Of Items1
Number Of Pages800
Package DimensionsHeight: 157; Length: 906; Weight: 270; Width: 705
Product GroupBook
Product Type NameABIS_BOOK
Publication Date2018-09-10
PublisherAddison-Wesley Professional
Release Date2018-08-06
StudioAddison-Wesley Professional
TitleEffective Cybersecurity: A Guide to Using Best Practices and Standards

Stuxnet-The First Cyber Guided Missile

1 new from 0.00
Set It Now
as of October 15, 2018 10:50 pm


BindingPrime Video
CreatorPaul Rosenzweig; Paul Rosenzweig; Paul Rosenzweig; The Great Courses; The Great Courses; The Great Courses
Episode Sequence1
GenreNonfiction - Educational
Product GroupTV Series Episode Video on Demand
Release Date2014-11-01
Running Time32
StudioThe Great Courses
TitleStuxnet-The First Cyber Guided Missile

Cybersecurity Best Practices - Center for Internet Security

Cybersecurity Best Practices. CIS Controls and CIS Benchmarks are global industry best practices endorsed by leading IT security vendors and governing bodies.

Automotive Cybersecurity Best Practices - Auto-ISAC

We released a Best Practices Executive Summary in July 2015 that is available to the public. The Best Practice Executive Summary is a high-level document defining key ...

Cybersecurity Best Practices Guide

Cybersecurity Best Practices Guide For IIROC Dealer Members 2 Table of Contents Executive Summary ...

Palo Alto Networks Cybersecurity Skills Practice Lab

Why Do You Need the Cybersecurity Skills Practice Lab? The cybersecurity industry is experiencing a severe talent shortage. Within just the next two years, this ...

Cybersecurity Practice | Korn Ferry

Our Cybersecurity team leverages deep industry expertise across information technology, national security, and professional services to provide specialized executive ...

Framework for Improving Critical Infrastructure Cybersecurity

February 12, 2014 Cybersecurity Framework Version 1.0 1 Executive Summary The national and economic security of the United States depends on the reliable functioning of

Cyber security standards - Wikipedia

Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the cyber environment ...

Jones Day | Cybersecurity, Privacy & Data Protection

Rapid response is imperative when there is a breach in data security or the loss of a computer containing sensitive information. Whatever the jurisdiction or ...

Cybersecurity Resource Center - AICPA

Find information and links to valuable resources for CPAs providing cybersecurity advisory and assurance services.

10 Cybersecurity Best Practices for IT, IS, Network & Data ...

Here are 10 essential cybersecurity best practices you may not have considered, but definitely should. These include IT, IS, network security and data security ...

10 Cyber Security Best Practices and Tips

Cyber Security Expert, Michael Gregg discusses 10 cyber security tips for online security.

Cell Phone Tracking Data, Data Entry Tracking Software, Data Tracking App, Data Tracking Companies, Data Tracking Example, Data Tracking Of Users, Data Tracking On Iphone 6, Data Tracking Software, Data Tracking System, Data Tracking Tools, Data Tracking Utility, Tracking Data Over Time, Tracking Data Usage, Tracking Data Usage At Home, Tracking Data Usage On Iphone, Tracking Data Usage On Iphone 6, Tracking Data Usage On Pc, Web App Data Tracking

Best Practices Of Cyber Security, Cyber Security Strategy Best Practices, Cybersecurity Best Practices 2018, Cybersecurity Best Practices And Standards, Cybersecurity Best Practices Guide, Cybersecurity Risk Management And Best Practices


Install Our App Now!

Responsive image Enjoy Super fast loading
Responsive image Get Exclusive Offer
Responsive image Works Offline
Just Click Add to Home

Install Our App Now!

Responsive image Enjoy Super fast loading
Responsive image Get Exclusive Offer
Responsive image Works Offline
Just Click
& Select "Add to Home Screen"

Install Our App Now!

Responsive image Enjoy Super fast loading
Responsive image Get Exclusive Offer
Responsive image Works Offline

Just Click Responsive image
& Select "Add to Home Screen"