Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into…
Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The…
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the…
A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models…
A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that…
If you need to test your environment in a short period of time the WarBerry Pi is the right device…
Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers…
DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing…
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…
A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able…
This website uses cookies.