Trump said he will raise tariffs on $250 billion in Chinese goods to 30% and hike duties on another $300 billion in products to 15%.Politicsread more
China said on Saturday it strongly opposes Washington's decision to levy additional tariffs on $550 billion worth of Chinese goods and warned the United States of consequences...Politicsread more
The European Union will respond in kind if the U.S. imposes tariffs on France over digital tax plan, EU chief Donald Tusk told G-7.Technologyread more
Stocks dropped after Donald Trump ordered that U.S. manufacturers find alternatives to their operations in China.US Marketsread more
The final week of August could be highly volatile as markets fret over the economy and the latest developments in trade wars.Market Insiderread more
Federal Reserve Vice Chair Richard Clarida said Friday that the global economy has deteriorated in the past month.Marketsread more
The latest escalation in the trade war ups the odds the economy will fall into recession and that the Fed will aggressively cut rates.Market Insiderread more
Here are the products that stand to be the most affected by China's new tariffs on $75 billion worth of U.S. goods.Marketsread more
"We don't need China and, frankly, would be far better off without them," Trump tweeted.Politicsread more
Recent trade friction between the two Asian powerhouses has morphed into a dispute with political implications that go far beyond the region.Asia Politicsread more
"My only question is, who is our bigger enemy, Jay Powell or Chairman Xi?" Trump wrote amid a series of tweets that rattled markets Friday.Politicsread more
Tesla CEO Elon Musk told a hacker conference in Las Vegas he plans to "open source" the software Tesla uses to secure autonomous-driving features from hacks or takeovers, eventually allowing other carmakers to use it.
It's a bid to make autonomous vehicle software safer by opening the software to more scrutiny, he told a private audience of around 100 people on Friday at DEFCON, an annual cybersecurity defense conference held in Las Vegas.
"I think one of the biggest concerns for autonomous vehicles is somebody achieving a fleet-wide hack," he said according to people who attended. Musk confirmed the decision in a tweet on Saturday, writing it was "extremely important to a safe self-driving future for all."
Musk said the move is partly meant to show that Tesla is putting security concerns above worries over protecting intellectual property, according to the people. It's a departure from self-driving competitors that have fiercely protected their intellectual property, often through litigation (see Uber Technologies' dispute with Alphabet's Waymo ").
For many companies, keeping source code secret has itself been considered a security measure. Proprietary source code's value is diminished, the thinking goes, because criminals would rather find and exploit software that many corporations use at once, giving them access to more targets.
But "obscurity" as a security strategy has proven ineffective in several cases.
For instance, software that would previously have been considered obscure — such as that which runs voting machines or operations and control rooms within electrical plants — has proven both vulnerable and desirable to criminals. In addition, while keeping code secret makes it harder for attackers to find and exploit holes, it also makes it harder for security researchers and customers to find holes and demand a fix.
Musk has long invited hackers to test Tesla's systems, and the company has one of the industry's most robust "bug bounty" programs. Bug bounties involve inviting cybersecurity professionals to hack the company's systems in exchange for a monetary reward, public recognition or both.
According to information from Bugcrowd, a company that facilitates Tesla's bug bounty program, these rewards range from $100 to $10,000. The average payout to successful hackers in the past three months has been around $1,860, according to Bugcrowd.
Engaging security professionals in this way relies on a series of rules defined informally by bug bounty companies, corporations that wish to engage hackers and the hackers themselves.
Those rules include that hackers who find a vulnerability must allow companies time to validate it and fix it before making the news public. This is an effort to avoid letting criminals know about the problem before it can be fixed.
Other rules include making efforts to avoid privacy violations and not modifying or destroying any data the bug bounty seekers access.