physical security

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into…

6 years ago

Police are warning crooks are using cleaners to compromise businesses

Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The…

6 years ago

Now you can buy USB Kill that could fry your PC via USB

The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the…

9 years ago

3D models based on Facebook images can fool Facial recognition systems

A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models…

9 years ago

Danger Drone, the flying hacking machine devised by a cyber security duo

A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that…

10 years ago

WarBerry Pi, a Tactical Exploitation device

If you need to test your environment in a short period of time the WarBerry Pi is the right device…

10 years ago

Remotely unlock doors exploiting a flaw in HID Door Controllers

Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers…

10 years ago

DroneDefender, electromagnetic gun that shoot down drones

DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing…

10 years ago

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…

10 years ago

Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able…

11 years ago

This website uses cookies.