Bad actors could take over a Jeep remotely with a cell phone, drive away with a Tesla Model 3 using simple hacking tools, or open, start and track connected vehicles from Kia, Skoda, Toyota and many other makers.
—
Srinivas Shekar,
Forbes.com,
8 Sep. 2025
In the hacking campaigns Proofpoint analyzed, cybercriminals attempted to trick users into downloading and installing Stealerium as an attachment or a web link, luring victims with typical bait like a fake payment or invoice.
Instead, 23-year-old Iryna Zarutska was stabbed to death in an unprovoked attack while riding a Charlotte, North Carolina, light rail train home from work.
—
Peter D'Abrosca , Stepheny Price , Emma Bussey,
FOXNews.com,
11 Sep. 2025
Three days later, the US Marshals Service found him in Texas, riding a bus headed to Mexico.
Examples are automatically compiled from online sources to
show current usage.Read More
Opinions expressed in the examples do not represent those of Merriam-Webster or its editors.
Send us feedback.
Share