Safety and Security (8)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 10 min
- The New York Times
- 2025
This article reports how Ukraine recovered debris from a newly encountered Shahed drone variant during Russian nighttime strikes. The drone was discovered to have advanced jamming tech, decoys, and saturation. The drone utilized new war tactics and had increased effectiveness of remote warfare.
- The New York Times
- 2025
-
- 10 min
- The New York Times
- 2025
The Weapon that Terrorizes Ukraine by Night
This article reports how Ukraine recovered debris from a newly encountered Shahed drone variant during Russian nighttime strikes. The drone was discovered to have advanced jamming tech, decoys, and saturation. The drone utilized new war tactics and had increased effectiveness of remote warfare.
- What are the strategic implications of Russia acquiring and relying on Iranian tech and mass drone use?
- What are the long-term consequences and ethics of the increased use of remote military drone capabilities? What are the connections between research and commercial technologies being applied to this change in warfare tactics?
-
- 3 min
- Cyber Security News
- 2025
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- Cyber Security News
- 2025
-
- 3 min
- Cyber Security News
- 2025
Tesla Wall Connector Hacked in 18 Minute Attack
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- What measures may be taken by Tesla (besides not documenting the feature altogether) to make the security on the wall adapter more robust?
- What responsibility does Tesla have in this situation towards its customers?
- What next steps should be taken to prevent this vulnerability from being exploited in Tesla wall adapters around the world?