Aerial Assault Drone, the new Hacking Weapon presented at the Defcon
A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented...
View ArticleHacking enterprise wireless Printers with a drone or a vacuum cleaner
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec...
View ArticleDroneDefender, electromagnetic gun that shoot down drones
DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing them to safe mode. While the number of drones in the sky is increasing...
View ArticleRemotely unlock doors exploiting a flaw in HID Door Controllers
Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers to open the doors. Security experts at Trend Micro have discovered a serious...
View ArticleWarBerry Pi, a Tactical Exploitation device
If you need to test your environment in a short period of time the WarBerry Pi is the right device to gather information on the target network. WarBerry Pi is a device that could be used by pen...
View ArticleDanger Drone, the flying hacking machine devised by a cyber security duo
A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a...
View Article3D models based on Facebook images can fool Facial recognition systems
A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain...
View ArticleNow you can buy USB Kill that could fry your PC via USB
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has created a...
View ArticlePolice are warning crooks are using cleaners to compromise businesses
Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The alert was launched by a senior police officer, cyber...
View ArticleHacking a network, using an ‘invisibility cloak’– Is it that simple?
Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into the target network. Is it possible to hack into a network using a sort of...
View Article