physical security

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into…

5 years ago
Police are warning crooks are using cleaners to compromise businessesPolice are warning crooks are using cleaners to compromise businesses

Police are warning crooks are using cleaners to compromise businesses

Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The…

5 years ago
Now you can buy USB Kill that could fry your PC via USBNow you can buy USB Kill that could fry your PC via USB

Now you can buy USB Kill that could fry your PC via USB

The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the…

9 years ago
3D models based on Facebook images can fool Facial recognition systems3D models based on Facebook images can fool Facial recognition systems

3D models based on Facebook images can fool Facial recognition systems

A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models…

9 years ago
Danger Drone, the flying hacking machine devised by a cyber security duoDanger Drone, the flying hacking machine devised by a cyber security duo

Danger Drone, the flying hacking machine devised by a cyber security duo

A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that…

9 years ago
WarBerry Pi, a Tactical Exploitation deviceWarBerry Pi, a Tactical Exploitation device

WarBerry Pi, a Tactical Exploitation device

If you need to test your environment in a short period of time the WarBerry Pi is the right device…

9 years ago
Remotely unlock doors exploiting a flaw in HID Door ControllersRemotely unlock doors exploiting a flaw in HID Door Controllers

Remotely unlock doors exploiting a flaw in HID Door Controllers

Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers…

9 years ago
DroneDefender, electromagnetic gun that shoot down dronesDroneDefender, electromagnetic gun that shoot down drones

DroneDefender, electromagnetic gun that shoot down drones

DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing…

10 years ago
Hacking enterprise wireless Printers with a drone or a vacuum cleanerHacking enterprise wireless Printers with a drone or a vacuum cleaner

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…

10 years ago
Aerial Assault Drone, the new Hacking Weapon presented at the DefconAerial Assault Drone, the new Hacking Weapon presented at the Defcon

Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able…

10 years ago