HackDig : Dig high-quality web security articles for hacker

Biotech health care innovations meet security challenges

The level and speed of innovations taking place in the biotech industry are baffling. On the one hand, it makes us hopeful we can quickly reduce the number of illnesses and their consequences through technological advancement—saving thousands of lives. On the other, concerns about the application of Internet-connected technology leave us wondering: at what c
Publish At:2020-02-25 14:40 | Read:264 | Comments:0 | Tags:Vital infrastructure AI biosensors BLE bluetooth dna-test fd

SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors

Security experts have discovered multiple flaws, dubbed SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. A group of researchers has discovered multiple vulnerabilities, tracked as SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. The group was co
Publish At:2020-02-15 17:31 | Read:177 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth informati

Bluetooth bugs – researchers find 10 “Sweyntooth” security holes

byPaul DucklinA trio of researchers from Singapore just published a paper detailing a number of security holes they discovered in Bluetooth chips from several different vendors.The good news is that they disclosed the holes responsibly back in 2019 and waited 90 days – a sort-of industry standard period popularised by Google’s Project Zero team &
Publish At:2020-02-15 12:43 | Read:190 | Comments:0 | Tags:Vulnerability bluetooth cybersecurity Sweyntooth vulnerabili

Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction

Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. Google has addressed a critical flaw in Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. The vulnerability tracked as CVE-2020-0022 is a remote code execution
Publish At:2020-02-09 10:43 | Read:290 | Comments:0 | Tags:Breaking News Cyber Crime Mobile Android Bluetooth CVE-2020-

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection.  T
Publish At:2017-10-01 20:55 | Read:5095 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth IoT priva

Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices

by Vít Šembera (Cyber Threat Researcher) BlueBorne is a set of vulnerabilities affecting the implementation of Bluetooth in iOS, Android, Linux, Windows and Mac OS* devices. According to the researchers who uncovered them, BlueBorne affects around 5.3 billion Bluetooth-enabled devices. The immediate mitigation for BlueBorne is to patch the device, if there’s
Publish At:2017-09-15 23:05 | Read:5334 | Comments:0 | Tags:Exploits Internet of Things Vulnerabilities BlueBorne Blueto

More on Bluetooth Ingenico Overlay Skimmers

This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store self-checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, a
Publish At:2017-02-27 02:20 | Read:3390 | Comments:0 | Tags:Other Bluetooth Ingenico overlay skimmer ISC-250 self-checko

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards
Publish At:2016-12-13 18:40 | Read:3634 | Comments:0 | Tags:Application Security Data Protection Bluetooth Connected Dev

Self-Checkout Skimmers Go Bluetooth

This blog has featured several stories about payment card skimming devices designed to be placed over top of credit card terminals in self-checkout lanes at grocery stores and other retailers. Many readers have asked for more details about the electronics that power these so-called “overlay” skimmers. Here’s a look at one overlay skimmer  e
Publish At:2016-10-15 07:45 | Read:3310 | Comments:0 | Tags:Other Bluetooth Ingenico Ingenico self-checkout skimmer Inge

Inside Arizona’s Pump Skimmer Scourge

Crooks who deploy skimming devices made to steal payment card details from fuel station pumps don’t just target filling stations at random: They tend to focus on those that neglect to deploy various tools designed to minimize such scams, including security cameras, non-standard pump locks and tamper-proof security tape. But don’t take my word for
Publish At:2016-09-27 19:15 | Read:4551 | Comments:0 | Tags:Other Arizona Department of Agriculture Bluetooth gas statio

Hardware Hacking Week @ ERNW

Internal workshops are one of the reoccurring events at ERNW, that help us to gain knowledge in areas outside our usual expertise. One of the recent workshops which happened during the week from August 22nd-25th was Hardware Hacking. Held by Brian Butterly (@BadgeWizard) and Dominic Spill (@dominicgs), this workshop took place in two parts. Brian kickstarted
Publish At:2016-09-10 00:20 | Read:3682 | Comments:0 | Tags:ERNW Bluetooth Ubertooth victor

DEF CON 2016 – Bluetooth-based smart locks easy to hack

Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last week security researchers Ben Ramsey and Anthony Rose of Merculite Security demonstrated at the Def Con conference how it is easy to open some Bluetooth-based smart locks. The duo analyzed 16 smart locks from companies such as Ceom
Publish At:2016-08-14 07:05 | Read:3313 | Comments:0 | Tags:Breaking News Hacking Bluetooth def con IoT smart locks

10-Second Hack Delivers First Ever Malware to Fitness Trackers

A security researcher has developed a method by which one can exploit a vulnerability in FitBit fitness trackers and subsequently deliver malware to the target device in 10 seconds.FitBit (Source: PCMag)Axelle Apvrille (@cryptax), a malware researcher at network security firm Fortinet, has found that FitBit wearables are open on their Bluetooth ports, a prop
Publish At:2015-10-21 08:30 | Read:3189 | Comments:0 | Tags:Latest Security News Axelle Apvrille bluetooth FitBit hack H

Tracking a Bluetooth Skimmer Gang in Mexico

-Sept. 9, 12:30 p.m. CT, Yucatan Peninsula, Mexico: Halfway down the southbound four-lane highway from Cancun to the ancient ruins in Tulum, traffic inexplicably slowed to a halt. There was some sort of checkpoint ahead by the Mexican Federal Police. I began to wonder whether it was a good idea to have brought along the ATM skimmer instead of leaving it in t
Publish At:2015-09-27 11:50 | Read:8116 | Comments:0 | Tags:A Little Sunshine All About Skimmers Android atm skimmer Blu

BTCrawler – Bluetooth Diagnostic & Discovery Tool

BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth
Publish At:2015-06-27 19:30 | Read:4176 | Comments:0 | Tags:Hacking Tools Network Hacking bluetooth bluetooth device dis


Share high-quality web security related articles with you:)


Tag Cloud