Quantcast
Channel: physical security Archives - Security Affairs
Browsing latest articles
Browse All 14 View Live

Image may be NSFW.
Clik here to view.

Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented...

View Article


Image may be NSFW.
Clik here to view.

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec...

View Article


Image may be NSFW.
Clik here to view.

DroneDefender, electromagnetic gun that shoot down drones

DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing them to safe mode. While the number of drones in the sky is increasing...

View Article

Image may be NSFW.
Clik here to view.

Remotely unlock doors exploiting a flaw in HID Door Controllers

Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers to open the doors. Security experts at Trend Micro have discovered a serious...

View Article

Image may be NSFW.
Clik here to view.

WarBerry Pi, a Tactical Exploitation device

If you need to test your environment in a short period of time the WarBerry Pi is the right device to gather information on the target network. WarBerry Pi is a device that could be used by pen...

View Article


Image may be NSFW.
Clik here to view.

Danger Drone, the flying hacking machine devised by a cyber security duo

A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a...

View Article

Image may be NSFW.
Clik here to view.

3D models based on Facebook images can fool Facial recognition systems

A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain...

View Article

Image may be NSFW.
Clik here to view.

Now you can buy USB Kill that could fry your PC via USB

The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has created a...

View Article


Police are warning crooks are using cleaners to compromise businesses

Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The alert was launched by a senior police officer, cyber...

View Article


Hacking a network, using an ‘invisibility cloak’– Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into the target network. Is it possible to hack into a network using a sort of...

View Article
Browsing latest articles
Browse All 14 View Live