The Late Late Tech Show… so late it’s Monday Morning

E-commerce exploits, Toyota Japan is attacked, and medical implants that can be hacked: Volume 2.

Jagger Kachejian
Millennium Communications

--

A tech fun fact to let the coffee kick in…

TechHistory

Microsoft was founded on April 4th!

Back on April 4th, 1975, Bill Gates and Paul Allen got together and founded Microsoft. These two men were tirelessly working on creating BASIC for the Altair 8800, which was revolutionary in the form of a small personal computer. Some say it was just a late April Fool’s joke played on the industry, but you cannot deny the real impact it has had on all of our lives. In fact, a copy of Windows XP is probably still running an ATM near you.

The Tech Topics

Securityweek.com

Toyota Japanese Customers Info Gets Out

Toyota Tokyo Sales Holdings Inc. was targeted by a cyber attack that accessed information of up to 3.1 million customers. Sales information with personal information was accessed; however, payment information for vehicles such as debit/credit cards was not. Does anyone seriously believe that hackers would go to the trouble to break in and then not access anything?

Toyota Vietnam Motor Company has also said it was possible they were attacked too, but what was accessed is still undetermined. With these cyber attacks in full flux, it can be seen that car manufacturers have to take a safer approach to their ever-evolving technology and private information of its customers.

Medtechdive.com

A Change of Settings Could be Fatal

A flaw in the security of cardiac implants designed by Medtronics shows that it is possible for hackers to change the settings on defibrillator implants and more, according to the Department of Homeland Security. This vulnerability has not been exploited yet, but the possibility of someone able to control the implants inside of one's body is nonetheless frightening. It is now virtually possible to control one another's life by the screen of a phone.

Cinphe.com

Users of Magento for E-Commerce Need to Update, NOW

More than 300,000 e-commerce sites are at risk for card-skimming attacks. By utilizing a $0 transaction, attackers are able to gain access to credit card information that could result in losses for businesses and consumers. No such attack has taken place, as this is a preventative measure after receiving a severity rating of 9.8 on the CVSS. In order to protect your site, make sure to update to Open Source 2.3.1. It just goes to show you why you need to stay current on patches and have layers of security.

Gearburn.com

You Didn’t See Me… or Those Messages

The Telegram app is now allowing users to completely erase all messaging and chat history from not only your device but off of the others who received your message. This privacy-focused update puts the user’s digital footprint back in their control. Anything that gives users more control over privacy is important. Since Telegram uses end-to-end encryption, this should allow you to delete all copies of a conversation. Governments are not going to like this. Now you don’t have to worry about having your foot in your mouth the next time you hit the send button.

Techhq.com

“Alexa, don't listen to this private meeting”

Last year Amazon introduced the Alexa for Business applications for the Alexa unit. These applications and smart tools would allow office spaces to become more integrated with one another through communication and meetings powered by the AI of Alexa. However, there are some drawbacks to Alexa as she is always listening to the conversations around the device. Privacy could become a concern as Alexa could possibly send an email or start a call without notifying you. If you are having an important conversation, Alexa does have a button to mute the mic which alerts you by turning its ring red. You might consider using it.

Till Next Time…

Come back in two weeks to see Volume 3 of The Late Late Tech Show! Until then, what do you think the answer to the following is?

Which one of the following is the address generated by CPU?
a) physical address
b) absolute address
c) logical address
d) none of the mentioned

Giphy

--

--