article thumbnail

Hacking Boston’s CharlieCard

Schneier on Security

Uncategorized hacking public transit transportationInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard.

Hacking 205
article thumbnail

Hacking Starlink

Schneier on Security

This is the first —of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices

Hacking 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Trespass Law

Schneier on Security

But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing. This particular hack will be adjudicated in court. Uncategorized A Hacker's Mind courts hacking

Hacking 200
article thumbnail

Hacking Automobile Keyless Entry Systems

Schneier on Security

The article doesn’t say how the hacking tool got installed into cars. Uncategorized cars hacking keys law enforcement theft

Hacking 268
article thumbnail

FireEye Hacked

Schneier on Security

FireEye was hacked by — they believe — “a nation with top-tier offensive capabilities”: During our investigation to date, we have found that the attacker targeted and accessed certain Red Team assessment tools that we use to test our customers’ security.

Hacking 255
article thumbnail

Hacking the JFK Airport Taxi Dispatch System

Schneier on Security

Two men have been convicted of hacking the taxi dispatch system at the JFK airport. Uncategorized air travel hacking transportationThis enabled them to reorder the taxis on the list; they charged taxi drivers $10 to cut the line.

Hacking 185
article thumbnail

When AIs Start Hacking

Schneier on Security

Hacking is as old as humanity. To date, hacking has exclusively been a human activity. After hacking humanity, AI systems will then hack other AI systems, and humans will be little more than collateral damage. Separately, AIs can engage in something called reward hacking.

Hacking 282
article thumbnail

More Russian Hacking

Schneier on Security

Uncategorized cybersecurity hacking malware Microsoft RussiaTwo reports this week.

Hacking 284
article thumbnail

Another SolarWinds Orion Hack

Schneier on Security

The sources, who spoke on condition of anonymity to discuss ongoing investigations, said the attackers used computer infrastructure and hacking tools previously deployed by state-backed Chinese cyberspies. […]. Uncategorized backdoors China cyberespionage FBI hacking Russia supply chai

Hacking 276
article thumbnail

Hacking Apple for Profit

Schneier on Security

Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. Uncategorized Apple hacking incentives vulnerabilities

Hacking 280
article thumbnail

Hacking a Coffee Maker

Schneier on Security

As expected, IoT devices are filled with vulnerabilities : As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of the older coffee makers to see what kinds of hacks he could do with it.

Hacking 281
article thumbnail

NSO Group Hacked

Schneier on Security

NSO Group, the Israeli cyberweapons arms manufacturer behind the Pegasus spyware — used by authoritarian regimes around the world to spy on dissidents, journalists, human rights workers, and others — was hacked.

Hacking 285
article thumbnail

Hacking the Sony Playstation 5

Schneier on Security

I just don’t think it’s possible to create a hack-proof computer system, especially when the system is physically in the hands of the hackers. Uncategorized exploits gaming consoles hacking reverse engineering

Hacking 244
article thumbnail

Hacked by Police

Schneier on Security

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents.

Hacking 269
article thumbnail

2017 Tesla Hack

Schneier on Security

cars classbreaks hacking vulnerabilitiesInteresting story of a class break against the entire Tesla fleet.

Hacking 215
article thumbnail

Iranian State-Sponsored Hacking Attempts

Schneier on Security

Uncategorized cybersecurity hacking Iran phishing

Hacking 277
article thumbnail

Accellion Supply Chain Hack

Schneier on Security

A vulnerability in the Accellion file-transfer program is being used by criminal groups to hack networks worldwide. Uncategorized hacking patching supply chain vulnerabilities

Hacking 215
article thumbnail

North Korea ATM Hack

Schneier on Security

atms banking cybercrime cybersecurity hacking malware northkorea

Hacking 240
article thumbnail

Hacking AI-Graded Tests

Schneier on Security

artificialintelligence cheating hacking schoolsThe company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis.

Hacking 217
article thumbnail

Kevin Mitnick Hacked California Law in 1983

Hacker News

Early in his career, Kevin Mitnick successfully hacked California law. Uncategorized A Hacker's Mind courts hackingHe told me the story when he heard about my new book , which he partially recounts his 2012 book, Ghost in the Wires.

Hacking 110
article thumbnail

Three Top Russian Cybercrime Forums Hacked

Krebs on Security

Over the past few weeks, three of the longest running and most venerated Russian-language online forums serving thousands of experienced cybercriminals have been hacked. A note posted by a Verified forum administrator concerning the hack of its registrar in January.

article thumbnail

Hacking a Power Supply

Schneier on Security

This hack targets the firmware on modern power supplies. academicpapers firmware hacking phonesYes, power supplies are also computers.).

Hacking 224
article thumbnail

Hacking Digitally Signed PDF Files

Schneier on Security

Uncategorized academic papers Adobe hacking signaturesInteresting paper: “ Shadow Attacks: Hiding and Replacing Content in Signed PDFs “: Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee the authenticity and integrity of their content.

Hacking 271
article thumbnail

Hacking Alexa through Alexa’s Speech

Schneier on Security

Uncategorized academic papers Amazon hacking voice recognitionAn Alexa can respond to voice commands it issues. This can be exploited : The attack works by using the device’s speaker to issue voice commands.

Hacking 266
article thumbnail

Hacked Cellebrite and MSAB Software Released

Schneier on Security

Cellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the same thing. Someone has released software and documentation from both companies. Uncategorized cyberweapons leaks smartphones

Software 187
article thumbnail

Marriott Was Hacked -- Again

Schneier on Security

accountability breaches disclosure hacking hotelsMarriott announced another data breach, this one affecting 5.2

Hacking 245
article thumbnail

UAE Hack and Leak Operations

Schneier on Security

Interesting paper on recent hack-and-leak operations attributed to the UAE: Abstract: Four hack-and-leak operations in U.S. academicpapers cybersecurity hacking leaks nationalsecuritypolicy qatar saudiarabia unitedarabemirates

Hacking 245
article thumbnail

High-School Graduation Prank Hack

Schneier on Security

This is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools.

Hacking 182
article thumbnail

Tesla Remotely Hacked from a Drone

Schneier on Security

This is an impressive hack: Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. Uncategorized cars drones hacking vulnerabilities Wi-Fi

Hacking 276
article thumbnail

How to Start Learning Ethical Hacking – Hacking Beginners Guide

Security Boulevard

Hacking is an interesting and challenging activity that can be both fun and educational. There are many different ways to learn Ethical hacking, but the best way to learn is to get your hands dirty and try it out for yourself.

Hacking 83
article thumbnail

The Worst Hacks of 2022

WIRED Threat Level

Security Security / Cyberattacks and Hacks Security / National SecurityThe year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.

article thumbnail

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked

Krebs on Security

InfraGard , a program run by the U.S.

Hacking 283
article thumbnail

Details of an NSA Hacking Operation

Schneier on Security

Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group).

Hacking 201
article thumbnail

On the Irish Health Services Executive Hack

Schneier on Security

Uncategorized hacking Ireland ransomware reports security policies

Hacking 242
article thumbnail

Dark Web Hosting Provider Hacked

Schneier on Security

Daniel's Hosting, which hosts about 7,600 dark web portals for free, has been hacked and is down. darkweb hackingIt's unclear when, or if, it will be back up.

Hacking 226
article thumbnail

Signal Phone Numbers Exposed in Twilio Hack

Schneier on Security

Uncategorized cell phones data breaches hacking Signal

Hacking 178
article thumbnail

The Story of the 2011 RSA Hack

Schneier on Security

Really good long article about the Chinese hacking of RSA, Inc. Uncategorized China cybersecurity hacking RSA supply chainThey were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come.

Hacking 228
article thumbnail

Hacking McDonald's for Free Food

Schneier on Security

This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany end with a link to a survey page. authentication hacking vulnerabilities

Hacking 258
article thumbnail

Successful Hack of Time-Triggered Ethernet

Schneier on Security

Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have defeated it : On Tuesday, researchers published findings that, for the first time, break TTE’s isolation guarantees.

Hacking 208
article thumbnail

Hacking School Surveillance Systems

Schneier on Security

Lance Vick suggesting that students hack their schools' surveillance systems. generations hacking privacy schools surveillanceThis is an ethical minefield that I feel students would be well within their rights to challenge, and if needed, undermine," he said.

article thumbnail

Hacked Ring Cams Used to Record Swatting Victims

Krebs on Security

men have been charged with hacking into the Ring home security cameras of a dozen random people and then “swatting” them — falsely reporting a violent incident at the target’s address to trick local police into responding with force.

Hacking 226
article thumbnail

Android Application Hacking

Security Boulevard

The post Android Application Hacking appeared first on Kratikal Blogs. The post Android Application Hacking appeared first on Security Boulevard. Application Security Security Bloggers Network Android Application Hacking Cyber Security owasp pentesting Reverse Engineering VAPT

Hacking 91
article thumbnail

Latest on the SVR’s SolarWinds Hack

Schneier on Security

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). There is also no indication yet that any human intelligence alerted the United States to the hacking.

Hacking 256