More from The Register
General Motors turns key on bug bounty program
With a zillion suppliers under the hood of most cars, this could get interesting
Ford recalls 433,000 cars: Software bug breaks engine off-switch
Turning it off and on again not possible until a dealer fixes it
Unlock and start General Motors cars with a $100 box of tricks – hacker
Flap over crap OnStar app yak, all will be revealed at DEF CON yap
Data theft prevention
This data theft prevention report focuses on how to stay secure while you innovate from a broader, in-scope, more intelligent in application perspective.
IBM X-Force Threat Intelligence Quarterly 4Q 2015
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Assuring workload performance through Pure Storage and VMTurbo
Three primary use cases for the VMTurbo Pure Storage Control Module are discussed, including assuring performance in both homogeneous and heterogeneous storage environments.
The 8 high-risk cyber threats that put all organisations at risk
In the Threat Report, Forcepoint Security Labs explores trends that pose significant risk for data theft and how to tackle them.