Post Thumbnail

It's the job of a security researcher to figure out how the company they are working for could be compromised. Apparently that now means using a drone sniff out vulnerabilities a few dozen feet off the ground. The Aerial Assault drone houses a raspberry Pi running Kali Linux, a distro built specif...

August 17th 2015 at 3:44pm 0 Comments
Post Thumbnail

Two-factor can keep your Gmail, iCloud and other accounts from getting hacked, but it's unfortunately rather tedious to use. That's why a team of researchers from the Swiss Federal Institute of Technology in Zurich, Switzerland has developed a tool called "Sound-Proof" to make the process less pai...

August 16th 2015 at 5:04am 0 Comments
Post Thumbnail

Reuters reports that a pair of former employees have accused Moscow-based Kaspersky Labs of building malware to trick its competition into flagging and quarantining important, non-viral, files on customers' computers. Basically the malware would inject malicious bits of code into important PC file...

August 14th 2015 at 7:20pm 0 Comments
Post Thumbnail

Having outgrown the odiferous corridors of the Rio, hacker conference Def Con entered this year by relocating to Bally's Hotel and Casino -- a venue described to me, in turns, by a Mandalay Bay hairdresser as "a shithole," a taxi driver as "a punishment" and a Mandarin Hotel bar waitress as "total...

August 14th 2015 at 5:10pm 0 Comments
Post Thumbnail

Immobilizers are supposed to kill a vehicle's engine to prevent it from being stolen. However, a trio of researchers recently released a study that reveals the Megamos immobilizer system used by more than two dozen car manufacturers -- including Volkswagen, Porsche and Honda -- can be cracked with...

August 14th 2015 at 1:44pm 0 Comments
Post Thumbnail

Last month security researcher Samy Kamkar announced a vulnerability that allowed him to remotely unlock OnStar-enabled GM cars. While that issue has been fixed, it looks like the same vulnerability found in OnStar is also present in BMW Remote, Mercedes' mbrace and Chrysler's Uconnect. Kamkar tol...

August 13th 2015 at 6:36pm 0 Comments
Post Thumbnail

In a ballroom in Bally's Vegas casino, kids are lined up on either side of a table with soldering guns melting metal to metal. Their small hands deftly join LED to circuit board, while a few feet away other children are learning the basics of developing. In the back of the room, a group of childre...

August 13th 2015 at 3:15pm 0 Comments
Post Thumbnail

The Stagefright vulnerability for Android won't seem to want to go away. According to Exodus Intelligence researchers one of the patched issued by Google could still allow access to Android devices. The researchers told Engadget via email, "the summary is that the Stagefright vulnerability is stil...

August 13th 2015 at 2:52pm 0 Comments
Post Thumbnail

If you're so concerned about the security of your Dropbox account that even two-factor authentication through your phone seems too risky, you can rest easy. The cloud storage outfit has added support for USB keys as part of the two-factor sign-in process. Rather than punch in a code, you just pl...

August 12th 2015 at 3:51pm 0 Comments
Post Thumbnail

Samsung isn't the only Windows PC maker to have hijacked Windows' update process as of late. Users have noticed that some Lenovo PCs running Windows 7 and 8 (such as the Yoga 3) had firmware that automatically downloaded and installed Lenovo's own update software on boot, overwriting a Windows sys...

August 12th 2015 at 11:11am 0 Comments
Post Thumbnail

The phrase I saw and heard over and over again while talking to other journalists and security researchers about the Def Con hacker convention was "hostile environment." Not physically hostile; the attendees and staff were extremely nice. The hostility was digital. The hackers and security researc...

August 11th 2015 at 5:34pm 0 Comments
Post Thumbnail

It's not only Chrysler drivers that have to worry about hackers taking control of their cars from afar. UC San Diego researchers have found that you can control features on cars of many makes by exploiting vulnerabilities in cellular-capable dongles that are sometimes plugged into the vehicles' O...

August 11th 2015 at 12:56pm 0 Comments