WE speak a lot about ransomware, malware and phishing attacks – but sometimes a cyber attack is just, defeat the security and grab the data. This is what has happened to the computer game developer Rockstar. Grand Theft Auto VI footage leaked after hack, developer Rockstar confirms – BBC News …
Tesla hacking… and a practical solution
Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …
Air gapping – not as secure as you think – enter Gairoscope and EtherLED
I have reported on other air gap exploits by Mordechai Guri, from Ben-Gurion University in Israel – here are two more ways that the secure air gapped system can be exploited: GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes (arxiv.org) ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via …
Continue reading “Air gapping – not as secure as you think – enter Gairoscope and EtherLED”
High School Prank – Are you still using default passwords?
It was a prank, but it was also serious hacking. The only thing that stopped it being a criminal case was that the school IT support had not reset default passwords and if they did they used the example password in the manual and that the hackers acted in a …
Continue reading “High School Prank – Are you still using default passwords?”
Hacking Google
Stefan Friedli from the Google Red Team has written an interesting article on they hack and test the Google systems. Meet the team responsible for hacking Google (blog.google)
