More from The Register
General Motors turns key on bug bounty program
With a zillion suppliers under the hood of most cars, this could get interesting
Unlock and start General Motors cars with a $100 box of tricks – hacker
Flap over crap OnStar app yak, all will be revealed at DEF CON yap
General Motors to intro HANDS-FREE DRIVING tech by 2016
Mary Barra's firm will also get your cars chatting to each other
General Motors issues STOP DELIVERY for 2,800 corvettes over defects in 2015 model
Faulty air bags and parking brake cables halt sales
Mobile is the new playground for thieves
Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints.
Put The Business Back In Your Data Management Business Case
Be customer-driven: It’s time for enterprise architects to put the business back in the business case.
Sandbox technology: building an effective breach detection and response strategy
If you’re not adequately protecting your personal data, it will fall into the wrong hands.
The industralization of hacking
View this infographic and learn how you can better defend against such advanced Web-based attacks.