IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I love some of the gangster nicknames people come up with. Knuckles, Fat Tony , Stab Happy or even Bambi. Names are characteristic of their personality and attitude. Itâs time to add Toaster Socket to the […]
Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last week security researchers Ben Ramsey and Anthony Rose of Merculite Security demonstrated at the Def Con conference how it is easy to open some Bluetooth-based smart locks. The duo analyzed 16 smart locks from companies […]
At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a computer through its monitor. It is a common error consider monitors as a passive device that could not be exploited by attackers to hack our systems. The reality is quite different, attackers could hijack every monitor […]
The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution. Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications firms on board, manufacturers are coming up with new, innovative uses for everyday objects. Yet linking these […]
Experts discovered that Wireless keyboards from several vendors donât use encryption when communicating with USB dongle being opened to KeySniffer attacks Security experts from Bastille firm have devised a method of attack dubbed KeySniffer to remotely intercept keystrokes or send commands to a targeted computer. The researchers have analyzed non-Bluetooth wireless keyboards from 12 manufacturers discovering that […]
According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of recommendations to avoid privacy breaches. Early this year, the Shodan search engine launched a feature that lets users easily access vulnerable webcams. In September 2015, researchers from the Rapid7 security firm discovered a number of security vulnerabilities affecting several Video […]
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flaw that could be exploited by hackers to compromise them, this time we speak of Car Hacking. Almost any modern connected vehicle uses a drive-by-wire system that […]
A vulnerability in the firmware running on many D-Link products allows attackers to take over cameras and other 120 products. A month ago, the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera. The vulnerability allows code injection which lets the attackers […]
Billy Rios is one of the most skilled hackers that revealed us how is vulnerable to hacking attacks our society. Are you interested in the hacking of critical infrastructure? Are you worried about the security of medical devices? Billy Rios is one of the most skilled hackers that could provide you the answers to your questions. […]
The Lizardsquadâs botnet known as LizardStresser is now leveraging on Internet of Things devices, latest waves of DDoS attack reached 400Gbps. The Lizardstresser DDoS botnet has been increasing in popularity throughout 2016 and is being used increasingly to target the Internet of Things. Arbor Networks reported in their blog, a marked increase since the start […]