Compliance: An Often Overlooked, Powerful Method of Threat Prevention
Which are different components that must be taken into consideration to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must...
View ArticleDiscover your Master padlock number of quick steps
The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or less. Have you ever gone in the Gym and after a long and tiring workout...
View ArticleCombo Breaker, a DIY tool to easily crack many Master padlocks
The security expert Samy Kamkar after the disclosure of a method to easily crack many Master padlock combinations designed Combo Breaker to mechanize it. A couple of weeks ago, the popular security...
View ArticleBLEkey – How to Clone RFID cards with a $10 device
Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in...
View ArticleAerial Assault Drone, the new Hacking Weapon presented at the Defcon
A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented...
View ArticleHacking enterprise wireless Printers with a drone or a vacuum cleaner
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec...
View ArticleDroneDefender, electromagnetic gun that shoot down drones
DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing them to safe mode. While the number of drones in the sky is increasing...
View ArticleRemotely unlock doors exploiting a flaw in HID Door Controllers
Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers to open the doors. Security experts at Trend Micro have discovered a serious...
View ArticleWarBerry Pi, a Tactical Exploitation device
If you need to test your environment in a short period of time the WarBerry Pi is the right device to gather information on the target network. WarBerry Pi is a device that could be used by pen...
View ArticleDanger Drone, the flying hacking machine devised by a cyber security duo
A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a...
View Article3D models based on Facebook images can fool Facial recognition systems
A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain...
View ArticleNow you can buy USB Kill that could fry your PC via USB
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has created a...
View ArticlePolice are warning crooks are using cleaners to compromise businesses
Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The alert was launched by a senior police officer, cyber...
View ArticleHacking a network, using an ‘invisibility cloak’– Is it that simple?
Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into the target network. Is it possible to hack into a network using a sort of...
View Article