Post Thumbnail

Question: What is the title of that movie that revolves around a hacker (or two) caught up in a huge scheme or conspiracy that has something to do with a gargantuan corporation and/or the government? Your choices are: A.) Young-Angelina Jolie starrer Hackers B.) Travolta, Berry and Jackman movie

4 days ago 0 Comments
December 15, 2014 at 1:32AM
Post Thumbnail

Pwnie Express has a knack for stuffing powerful security testing tools into innocuous housings, and this time they're flexing that unique talent with the Pwnie Plug R2. Ars Technica's gotten ahold of the contraption ahead of its debut at the Black Hat conference, and it's boasting a healthy number

1 year ago 0 Comments
Post Thumbnail

We've already seen SCADA systems controlled by Google Search, and now the Black Hat Technical Security Conference is offering up yet another slice of cringe-inducing hacker pie. A pair of pros from iSec Partners security firm was able to unlock and start the engine of a Subaru Outback using an An

3 years ago 0 Comments
Post Thumbnail

Google, the service so great it became a verb, can now add security risk to its roster of unintended results. The search site played inadvertent host to remotely accessed Supervisory Control and Data Acquisition (SCADA) systems in a Black Hat conference demo led by FusionX's Tom Parker. The sec

3 years ago 0 Comments
Post Thumbnail

We've seen hackers use keyboards to deliver malicious code to computers, and we've seen smartphones used as remote controls for cars and TV -- but we've never seen a smartphone disguised as a keyboard used to control a computer, until now. A couple folks at this year's Black Hat DC conference have

3 years ago 0 Comments