Some minimal information about the NSA’s abilities to hack networks via submarine. Powered by WPeMatico
Category: hacking
Auto Added by WPeMatico
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system to get around its protections. Here, all Plore had to do was monitor power consumption in the case of one safe, and the amount of time operations took in other, and … Read More “Hacking Electronic Safes” »
Here’s an interesting hack against a computer’s monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor without getting into your actual computer, and both see the pixels displayed on the monitor — effectively spying on you — and also manipulate the pixels to display … Read More “Hacking Your Computer Monitor” »
We’re seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the Houston area. The Houston Chronicle reports that Michael Armando Arce and Jesse Irvin Zelaya were charged on August 4th, and are believed to be responsible for more … Read More “Hackers Stealing Cars” »
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats. Powered by WPeMatico
Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy activist, and so when she received a legitimate looking email containing a PowerPoint attachment addressed to her and purporting to detail “Assad Crimes,” she could easily have … Read More “How the Iranian Government Hacks Dissidents” »
Good article. And I was interviews on WGBH on the topic. Powered by WPeMatico
Another hijack attack against vehicles, this time trucks and buses. Powered by WPeMatico
Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille’s research team revealed a new set of wireless keyboard attacks they’re calling Keysniffer. The technique, which they’re planning to detail at the Defcon hacker conference in two weeks, allows any hacker with a $12 radio device to intercept … Read More “Security Vulnerabilities in Wireless Keyboards” »
Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, … Read More “Real-World Security and the Internet of Things” »