New Atlas has a great three-part feature on the history of hacking as portrayed in films, including video clips. The 1980s. The 1990s. The 2000s. Powered by WPeMatico
Category: hacking
Auto Added by WPeMatico
There’s another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here and here, Monday’s dump contains 352 distinct IP addresses and 306 domain names that purportedly have been hacked by the NSA. The timestamps included in the leak indicate … Read More “Another Shadow Brokers Leak” »
A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough has the potential to make millions of Android phones vulnerable, at least until a security fix is available, to a new form of attack that seizes control … Read More “Hardware Bit-Flipping Attacks in Practice” »
It was a phishing attack. Powered by WPeMatico
Good long article on the 2015 attack against the US Office of Personnel Management. Powered by WPeMatico
Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It’s a weird story. I’m not sure how they do it, but something doesn’t sound right. Another possibility is that CatchApp is malware thrust onto a device over Wi-Fi that specifically targets WhatsApp. But it’s almost certain the product … Read More “Is WhatsApp Hacked?” »
Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data breach of all time. Yahoo! claimed it was a government that did it: A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information … Read More “The Hacking of Yahoo” »
It took 24 hours. Slashdot thread. Powered by WPeMatico
Impressive remote hack of the Tesla Model S. Details. Video. The vulnerability has been fixed. Remember, a modern car isn’t an automobile with a computer in it. It’s a computer with four wheels and an engine. Actually, it’s a distributed 20-400-computer system with four wheels and an engine. Powered by WPeMatico
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards for that session can be determined. The program can be easily parallelized. This analysis can be finished while sessions are still running this would permit the following type of attack: A … Read More “Hacking Bridge-Hand Generation Software” »