Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …
Air gapping – not as secure as you think – enter Gairoscope and EtherLED
I have reported on other air gap exploits by Mordechai Guri, from Ben-Gurion University in Israel – here are two more ways that the secure air gapped system can be exploited: GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes (arxiv.org) ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via …
Continue reading “Air gapping – not as secure as you think – enter Gairoscope and EtherLED”
High School Prank – Are you still using default passwords?
It was a prank, but it was also serious hacking. The only thing that stopped it being a criminal case was that the school IT support had not reset default passwords and if they did they used the example password in the manual and that the hackers acted in a …
Continue reading “High School Prank – Are you still using default passwords?”
Hacking Google
Stefan Friedli from the Google Red Team has written an interesting article on they hack and test the Google systems. Meet the team responsible for hacking Google (blog.google)
BreachForums is more popular than ever with threat actors
BreachForums is a site that shares stolen data between threat actors – and it is expanding mainly due to the “billion record Chinese hack” being shared there: Billion-record Chinese data leak’s host booms • The Register Don’t let your organisation’s information end up there!
Was Apple networking diverted through Russia?
Russia’s Rostelecom appears to have tried to route some of Apple’s network, via its servers. It did not go on for long as Apple engineers intervened. If you want to know how some users across the internet trying to connect to Apple services could have been directed to Rostelecom servers, …
Continue reading “Was Apple networking diverted through Russia?”
Really big numbers when it comes to leaking user’s personal data
One of the earliest posts on Smart Thinking was about Twitter being hacked: Twitter hack – Smart Thinking Solutions Now here we are again. What appears to be a lone threat actor, got inside their systems, with enough time to exfiltrate a substantial amount of Twitter user personal information. This …
Continue reading “Really big numbers when it comes to leaking user’s personal data”