Security

BLEkey – How to Clone RFID cards with a $10 deviceBLEkey – How to Clone RFID cards with a $10 device

BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these…

10 years ago
NSA will lose access to its surveillance metadata in Nov. 29NSA will lose access to its surveillance metadata in Nov. 29

NSA will lose access to its surveillance metadata in Nov. 29

Metadata acquired due to the NSA surveillance programs was ruled illegal by a court in May 2015. The NSA will…

10 years ago
UK – Parliament computers accessed 20,000 times a month porn sitesUK – Parliament computers accessed 20,000 times a month porn sites

UK – Parliament computers accessed 20,000 times a month porn sites

Bad habits are hard to eradicate, according to a post published by The Telegraph, porn sites accessed 20,000 times a…

10 years ago
Drone Firing Semi-Automatic Handgun, what’s next?Drone Firing Semi-Automatic Handgun, what’s next?

Drone Firing Semi-Automatic Handgun, what’s next?

While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict…

10 years ago
Security Affairs newsletter Round 19 – Best of the week from best sourcesSecurity Affairs newsletter Round 19 – Best of the week from best sources

Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Anonymous’s team GhostSec thwarts Isis terror plotsAnonymous’s team GhostSec thwarts Isis terror plots

Anonymous’s team GhostSec thwarts Isis terror plots

Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and…

10 years ago
HORNET, the High-Speed Tor-Like encrypted anonymous networkHORNET, the High-Speed Tor-Like encrypted anonymous network

HORNET, the High-Speed Tor-Like encrypted anonymous network

A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative…

10 years ago
Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC HackChrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in…

10 years ago
All Smartwatches on the market are vulnerable to attacksAll Smartwatches on the market are vulnerable to attacks

All Smartwatches on the market are vulnerable to attacks

A study conducted by HP's Fortify on security features implemented by Smartwatches revealed that not even a single device found…

10 years ago
Exploit acquisition program terminated by NetragardExploit acquisition program terminated by Netragard

Exploit acquisition program terminated by Netragard

Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm…

10 years ago