Hacking Boston’s CharlieCard
Schneier on Security
DECEMBER 14, 2022
Uncategorized hacking public transit transportationInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard.
Schneier on Security
DECEMBER 14, 2022
Uncategorized hacking public transit transportationInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard.
Schneier on Security
AUGUST 11, 2022
This is the first —of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
DECEMBER 9, 2022
But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing. This particular hack will be adjudicated in court. Uncategorized A Hacker's Mind courts hacking
Schneier on Security
OCTOBER 17, 2022
The article doesn’t say how the hacking tool got installed into cars. Uncategorized cars hacking keys law enforcement theft
Schneier on Security
DECEMBER 9, 2020
FireEye was hacked by — they believe — “a nation with top-tier offensive capabilities”: During our investigation to date, we have found that the attacker targeted and accessed certain Red Team assessment tools that we use to test our customers’ security.
Schneier on Security
DECEMBER 23, 2022
Two men have been convicted of hacking the taxi dispatch system at the JFK airport. Uncategorized air travel hacking transportationThis enabled them to reorder the taxis on the list; they charged taxi drivers $10 to cut the line.
Schneier on Security
APRIL 26, 2021
Hacking is as old as humanity. To date, hacking has exclusively been a human activity. After hacking humanity, AI systems will then hack other AI systems, and humans will be little more than collateral damage. Separately, AIs can engage in something called reward hacking.
Schneier on Security
JULY 2, 2021
Uncategorized cybersecurity hacking malware Microsoft RussiaTwo reports this week.
Schneier on Security
FEBRUARY 4, 2021
The sources, who spoke on condition of anonymity to discuss ongoing investigations, said the attackers used computer infrastructure and hacking tools previously deployed by state-backed Chinese cyberspies. […]. Uncategorized backdoors China cyberespionage FBI hacking Russia supply chai
Schneier on Security
OCTOBER 12, 2020
Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. Uncategorized Apple hacking incentives vulnerabilities
Schneier on Security
SEPTEMBER 29, 2020
As expected, IoT devices are filled with vulnerabilities : As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of the older coffee makers to see what kinds of hacks he could do with it.
Schneier on Security
JULY 20, 2021
NSO Group, the Israeli cyberweapons arms manufacturer behind the Pegasus spyware — used by authoritarian regimes around the world to spy on dissidents, journalists, human rights workers, and others — was hacked.
Schneier on Security
NOVEMBER 10, 2021
I just don’t think it’s possible to create a hack-proof computer system, especially when the system is physically in the hands of the hackers. Uncategorized exploits gaming consoles hacking reverse engineering
Schneier on Security
JULY 3, 2020
French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents.
Schneier on Security
SEPTEMBER 3, 2020
cars classbreaks hacking vulnerabilitiesInteresting story of a class break against the entire Tesla fleet.
Schneier on Security
JULY 13, 2021
Uncategorized cybersecurity hacking Iran phishing
Schneier on Security
MARCH 23, 2021
A vulnerability in the Accellion file-transfer program is being used by criminal groups to hack networks worldwide. Uncategorized hacking patching supply chain vulnerabilities
Schneier on Security
SEPTEMBER 1, 2020
atms banking cybercrime cybersecurity hacking malware northkorea
Schneier on Security
SEPTEMBER 4, 2020
artificialintelligence cheating hacking schoolsThe company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis.
Hacker News
JANUARY 27, 2023
Early in his career, Kevin Mitnick successfully hacked California law. Uncategorized A Hacker's Mind courts hackingHe told me the story when he heard about my new book , which he partially recounts his 2012 book, Ghost in the Wires.
Krebs on Security
MARCH 4, 2021
Over the past few weeks, three of the longest running and most venerated Russian-language online forums serving thousands of experienced cybercriminals have been hacked. A note posted by a Verified forum administrator concerning the hack of its registrar in January.
Schneier on Security
JULY 21, 2020
This hack targets the firmware on modern power supplies. academicpapers firmware hacking phonesYes, power supplies are also computers.).
Schneier on Security
MARCH 8, 2021
Uncategorized academic papers Adobe hacking signaturesInteresting paper: “ Shadow Attacks: Hiding and Replacing Content in Signed PDFs “: Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee the authenticity and integrity of their content.
Schneier on Security
MARCH 7, 2022
Uncategorized academic papers Amazon hacking voice recognitionAn Alexa can respond to voice commands it issues. This can be exploited : The attack works by using the device’s speaker to issue voice commands.
Schneier on Security
JANUARY 16, 2023
Cellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the same thing. Someone has released software and documentation from both companies. Uncategorized cyberweapons leaks smartphones
Schneier on Security
APRIL 2, 2020
accountability breaches disclosure hacking hotelsMarriott announced another data breach, this one affecting 5.2
Schneier on Security
AUGUST 13, 2020
Interesting paper on recent hack-and-leak operations attributed to the UAE: Abstract: Four hack-and-leak operations in U.S. academicpapers cybersecurity hacking leaks nationalsecuritypolicy qatar saudiarabia unitedarabemirates
Schneier on Security
AUGUST 31, 2022
This is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools.
Schneier on Security
MAY 4, 2021
This is an impressive hack: Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. Uncategorized cars drones hacking vulnerabilities Wi-Fi
Security Boulevard
NOVEMBER 25, 2022
Hacking is an interesting and challenging activity that can be both fun and educational. There are many different ways to learn Ethical hacking, but the best way to learn is to get your hands dirty and try it out for yourself.
WIRED Threat Level
DECEMBER 29, 2022
Security Security / Cyberattacks and Hacks Security / National SecurityThe year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.
Krebs on Security
DECEMBER 13, 2022
InfraGard , a program run by the U.S.
Schneier on Security
MARCH 3, 2022
Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group).
Schneier on Security
FEBRUARY 11, 2022
Uncategorized hacking Ireland ransomware reports security policies
Schneier on Security
APRIL 1, 2020
Daniel's Hosting, which hosts about 7,600 dark web portals for free, has been hacked and is down. darkweb hackingIt's unclear when, or if, it will be back up.
Schneier on Security
AUGUST 23, 2022
Uncategorized cell phones data breaches hacking Signal
Schneier on Security
MAY 27, 2021
Really good long article about the Chinese hacking of RSA, Inc. Uncategorized China cybersecurity hacking RSA supply chainThey were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come.
Schneier on Security
FEBRUARY 18, 2020
This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany end with a link to a survey page. authentication hacking vulnerabilities
Schneier on Security
NOVEMBER 18, 2022
Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have defeated it : On Tuesday, researchers published findings that, for the first time, break TTE’s isolation guarantees.
Schneier on Security
DECEMBER 30, 2019
Lance Vick suggesting that students hack their schools' surveillance systems. generations hacking privacy schools surveillanceThis is an ethical minefield that I feel students would be well within their rights to challenge, and if needed, undermine," he said.
Krebs on Security
DECEMBER 19, 2022
men have been charged with hacking into the Ring home security cameras of a dozen random people and then “swatting” them — falsely reporting a violent incident at the target’s address to trick local police into responding with force.
Security Boulevard
AUGUST 9, 2022
The post Android Application Hacking appeared first on Kratikal Blogs. The post Android Application Hacking appeared first on Security Boulevard. Application Security Security Bloggers Network Android Application Hacking Cyber Security owasp pentesting Reverse Engineering VAPT
Schneier on Security
JANUARY 5, 2021
The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). There is also no indication yet that any human intelligence alerted the United States to the hacking.
Let's personalize your content