![Tesla Model three knows if you hack it](/media/k2/items/cache/cb37c25d070636c5eb6e2042aa5a131c_Generic.jpg)
Tesla Model three knows if you hack it
Records your efforts for future court cases
As recently highlighted by a Tesla Model 3 owner on Reddit, your connected car knows when you've hacked it, and it might be logging that data to use against you in a future warranty claim.
![IBM watches Iranian hacker training video](/media/k2/items/cache/d6c1fc469d3bab84d3d960878874ee00_Generic.jpg)
IBM watches Iranian hacker training video
Five hours of footage
Security experts at IBM’s X-Force security team have obtained roughly five hours of video footage that appears to have been recorded directly from the screens of hackers working for a group IBM calls ITG18, and which other security firms refer to as APT35 or Charming Kitten.
![Anonymous is back](/media/k2/items/cache/ae21169443174b54512da79abca6526f_Generic.jpg)
Anonymous is back
Seems to be a busy time
"Hacktivist" group Anonymous has returned from the shadows and is promising to expose the "many crimes" of the Minneapolis city's police to the world.
![Hacker conspiracy award goes to Brian Kemp](/media/k2/items/cache/f132faff8176fc571d090ae48dde5239_Generic.jpg)
Hacker conspiracy award goes to Brian Kemp
Sees hacks when sitting on security holes
Georgia governor, Republican Brian Kemp seems to have a problem with democratic party hackers.
![Increased cloud use means more cloudy cyber attacks](/media/k2/items/cache/bc84d0829d13fdf0f363e77c954819eb_Generic.jpg)
Increased cloud use means more cloudy cyber attacks
McAfee sees evil cloud
There is a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic, along with an increase in cyber-attacks targeting the cloud.
![Attacks on supercomputers were crypto miners](/media/k2/items/cache/8555a3ddf092f083c03837abbdc53628_Generic.jpg)
Attacks on supercomputers were crypto miners
You can get a lot of cryptocurrency from a supercomputer
It would appear that the attacks on a dozen supercomputers across Europe were carried out by crypto miners hoping to make a quick buck.
![Someone is hacking European supercomputers](/media/k2/items/cache/4476d859470968f9c77931407131b142_Generic.jpg)
Someone is hacking European supercomputers
Hawk and Archer laid low but not Dove
Supercomputers across Germany and the United Kingdom have been attacked by hackers, since January this year.
![Thunderbolt enables hackers hard drive access](/media/k2/items/cache/fd285e8cff88104be9214f453a2803de_Generic.jpg)
Thunderbolt enables hackers hard drive access
All Thunderbolt-enabled PCs manufactured before 2019 affected
Vulnerabilities discovered in the Thunderbolt connection standard could allow hackers to access the contents of a locked laptop’s hard drive within minutes, according to an insecurity researcher from the Eindhoven University of Technology.
![Apple denies you can hack an iPhone with a blank email](/media/k2/items/cache/5e36be96761895cb82e048b3b8b89c03_Generic.jpg)
Apple denies you can hack an iPhone with a blank email
The blood of Steve Jobs protects us from all evil
Fruity cargo cult Apple insists that there is “no evidence” a flaw in its email app for iPhones and iPads has been used against customers and there is no immediate risk to customers.
![Hacking an iPhone is easy like Sunday morning](/media/k2/items/cache/14f0117e3e05ef1308830b73e9911415_Generic.jpg)
Hacking an iPhone is easy like Sunday morning
Just send a blank email
A security outfit has discovered Apple’s software has been completely insecure for years.