Tag Archives: hacking

Got $60? Reduce your Insurance Rates! Hack Your Car!

For the low price of $60, Eric Evenchick is selling a gadget that will allow a person to use a CANtact to talk directly to a vehicle’s CAN(controller area network)bus through the laptop, connected via USB to the CANtact device … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Got $60? Reduce your Insurance Rates! Hack Your Car!

NYPD Auxiliary Officer Hacking into NYPD Computer + FBI Database

Yehuda Katz, a New York City Police Department (NYPD) Auxiliary Deputy Inspector assigned to the 70th Precinct in Brooklyn, executed a scheme to hack into a restricted NYPD computer and other sensitive law enforcement databases. He was caught and brought … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on NYPD Auxiliary Officer Hacking into NYPD Computer + FBI Database

Car Updates to Enable Self-Driving

Rachel Maddow has a video on the self-driving car and how some cars today, already have the basic functionality, and just require the update. What isn’t covered, is how laws and law enforcement will perceive inebriated or sight impaired drivers if … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Car Updates to Enable Self-Driving

Men who Performed the Largest Data Breaches in History: Arrested

The Department of Justice reports, three men operating from Vietnam, the Netherlands, and Canada are accused of carrying out the largest data breach of names and email addresses in the history of the Internet. Two of the hackers, Viet Quoc … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Men who Performed the Largest Data Breaches in History: Arrested

Stupidest Movie Hacks

Dorkly had this posted, it’s worth a good chuckle!

Posted in Security Blog | Tagged , , | Comments Off on Stupidest Movie Hacks

Under 11 Minutes to Crack WiFi for 7 Year Old

Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old

Hacker’s List

A new service is online where a person posts a problem to solve as a job and another person bids on the work if they know how to solve it. So far, most problems look to be in regards to: … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Hacker’s List

Stealing Biometrics & Bypassing Authentication

Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Stealing Biometrics & Bypassing Authentication

The Raspberry Pi: Impact on Hacking

So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Raspberry Pi: Impact on Hacking

AirHopper. Keylogging Disconnected Computers.

AirHopper demonstrates how textual and binary data can be ex-filtrated from physically an isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13 to 60 bps. Enough to steal a password. The technology works … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on AirHopper. Keylogging Disconnected Computers.