Quantcast
Channel: physical security Archives - Security Affairs
Browsing all 14 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must...

View Article


Image may be NSFW.
Clik here to view.

Discover your Master padlock number of quick steps

The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or less. Have you ever gone in the Gym and after a long and tiring workout...

View Article


Image may be NSFW.
Clik here to view.

Combo Breaker, a DIY tool to easily crack many Master padlocks

The security expert Samy Kamkar after the disclosure of a method to easily crack many Master padlock combinations designed Combo Breaker to mechanize it. A couple of weeks ago, the popular security...

View Article

Image may be NSFW.
Clik here to view.

BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in...

View Article

Image may be NSFW.
Clik here to view.

Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented...

View Article


Image may be NSFW.
Clik here to view.

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec...

View Article

Image may be NSFW.
Clik here to view.

DroneDefender, electromagnetic gun that shoot down drones

DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing them to safe mode. While the number of drones in the sky is increasing...

View Article

Image may be NSFW.
Clik here to view.

Remotely unlock doors exploiting a flaw in HID Door Controllers

Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers to open the doors. Security experts at Trend Micro have discovered a serious...

View Article


Image may be NSFW.
Clik here to view.

WarBerry Pi, a Tactical Exploitation device

If you need to test your environment in a short period of time the WarBerry Pi is the right device to gather information on the target network. WarBerry Pi is a device that could be used by pen...

View Article


Image may be NSFW.
Clik here to view.

Danger Drone, the flying hacking machine devised by a cyber security duo

A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a...

View Article

Image may be NSFW.
Clik here to view.

3D models based on Facebook images can fool Facial recognition systems

A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain...

View Article

Image may be NSFW.
Clik here to view.

Now you can buy USB Kill that could fry your PC via USB

The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has created a...

View Article

Police are warning crooks are using cleaners to compromise businesses

Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The alert was launched by a senior police officer, cyber...

View Article


Hacking a network, using an ‘invisibility cloak’– Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into the target network. Is it possible to hack into a network using a sort of...

View Article
Browsing all 14 articles
Browse latest View live