According to police, the incident occurred just before 6 a.m. at a garage on West 43rd Street near the West Side Highway. Four men entered the garage around 5:45 a.m. and attempted to steal several luxury cars, including a blue McLaren sports car and a black Mercedes‑Benz G‑Wagon.
Intoxalock spokesperson Rachael Larson confirmed that the company had been hit by a cyberattack, stating that they took steps to temporarily pause some of their systems as a precautionary measure.
Despite significant investments and technological advancements, the reality is that no vehicle currently operating on public roads can be classified as fully autonomous. The complexities of real-world driving conditions present insurmountable challenges.
In the age of smart fobs and transponder chips, losing your keys isn't just a minor inconvenience; it can feel like a high-tech lockout from your own life. When the realization settles in, the clock starts ticking. Your first instinct might be to call the dealership, but that often leads to a massive towing bill and a multi-day wait for parts.
NEW YORK, NY- During the Albany budget hearing, Assemblyman Ranker Chan raised alarms over a series of car break-ins in his district, noting that 30 airbags were stolen overnight across two precincts. Overnight in neighborhoods including Bath Beach, Gravesend, and Bensonhurst, at least 30 cars had airbags stolen, officials said. Airbags, which can cost $1,000 or more to replace at dealerships, are targeted by thieves because they sell for $50-$200 on the black market.
Footage of the incident, which took place January 15, shows the robot sitting motionless on the tracks, seemingly making no attempt to get out of the way as the unmistakable blare of the train horn gets louder and louder. "Oh it's gonna crush it!" the onlooker taking the video can be heard saying moments before the train, operated by Brightline, flattens the unfortunate bot into the tracks. Sparks can be seen flying from beneath the train before the video cuts off.
"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Porter complained about difficulties when trying to insert lines in Excel. (Which, to be fair to Microsoft, is relatively straightforward - need to insert a row? Right-click on a selected row. Need to insert a line in text? Alt+Return is probably going to be your friend.) But then Porter turned to that other productivity stalwart, Word. "Never underestimate Microsoft's ability to make things more complicated," he said.
A reward of up to 1 million has been fofered for information regarding the suspected far-left arson attack that plunged parts of Berlin into a blackout in January Germany's economy has suffered nearly 1 trillion in losses from overlapping crises, according to experts The losses reflect the impact of the COVID-19 pandemic, Russia's war in Ukraine, and tougher US policy from the Trump White House Thousands of protesters expected at next week's Munich Security Conference
Welcome to Day One of Pwn2Own Automotive 2026! Today, 30 entries are taking the Pwn2Own stage to target the latest automotive systems, as the world's top security researchers push technology to its limits. Exploits, surprises, and breakthrough discoveries are already unfolding - follow along here for updates throughout the day as the competition continues. Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Automotive and #P2OAuto for continuous coverage.
Sometimes I'm rather impressed by the ingenuity of those in the business of making scammy gadgets. Over the years, I've examined a wide range of products, from scam devices that claim to save you money on your power bill to a high-power USB charger filled with an unusual goo-like substance. Also: Want to cut your electric bill? Skip these scam 'power-saving' devices - and buy this instead
As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
infosec in brief T'was a dark few days for automotive software systems last week, as the third annual Pwn2Own Automotive competition uncovered 76 unique zero-day vulnerabilities in targets ranging from Tesla infotainment to EV chargers. A record 73 entries were included in this year's competition at Automotive World in Tokyo, and, while not all were successful, Trend Micro's Zero Day Initiative still ended up paying out more than $1 million to successful competitors. For those unfamiliar with the structure of a Pwn2Own competition, ethical hackers and security experts enter with plans to perform a certain exploit, which they must do in a limited time.
In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."