A Closer Look at the Attempted Ransomware Attack on Tesla

Cybersecurity is in the news again with the disclosure that Tesla, working in conjunction with the FBI, prevented a ransomware attack from being launched at its Gigafactory in Nevada. The cybercriminals targeted ...
Tesla Fires Employee for Allegedly Sabotaging Operations at California-Based Factory

Tesla Fires Employee for Allegedly Sabotaging Operations at California-Based Factory

Employees at the Tesla car-manufacturing plant in Freemont, California, have been informed by company officials that a former worker “maliciously sabotaged” operations at the factory last month. According to an internal memo ...
Tesla Data Leak: Pre-Owned Vehicle Infotainment Components Store Owners’ Personal Details and Passwords

Tesla Data Leak: Pre-Owned Vehicle Infotainment Components Store Owners’ Personal Details and Passwords

According to white hat hacker GreenTheOnly, Tesla forgot to wipe personal information of customers from previously used infotainment and Autopilot hardware.The discovery came about after Green found and purchased four pre-owned Tesla ...

Security Metrics and Tesla’s Safety Statistics

I have long railed against the inadequacy of popular easy-to-record security metrics. They usually lack critical information about the nature and severity of vulnerabilities and are therefore misleading in providing support for ...
Huge prizes up for grabs for anyone who can hack a Tesla

Huge prizes up for grabs for anyone who can hack a Tesla

If you’re going to the CanSecWest conference in Vancouver this March you’ll have the chance to participate in the Pwn2Own ethical hacking contest. As usual hackers will be working hard to crack ...
Tesla Encouraging “Good Faith” Security Research in Bug Bounty Program

Tesla Encouraging “Good Faith” Security Research in Bug Bounty Program

Electric vehicle manufacturer Tesla is encouraging what it calls “good faith” security research in its bug bounty program. In its vulnerability disclosure program, Tesla says it welcomes “the community to participate in ...
7 Questions for Evaluating your Security Posture against Insider Threats

7 Questions for Evaluating your Security Posture against Insider Threats

Insider threats top the list of the most dangerous cyber risks for organizations worldwide. It doesn’t take much effort for insiders to steal your sensitive data, while such activities are hard to ...
APTs

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee ...
Security Boulevard