HackDig : Dig high-quality web security articles for hacker

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection.  T
Publish At:2017-10-01 20:55 | Read:4128 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth IoT priva

Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices

by Vít Šembera (Cyber Threat Researcher) BlueBorne is a set of vulnerabilities affecting the implementation of Bluetooth in iOS, Android, Linux, Windows and Mac OS* devices. According to the researchers who uncovered them, BlueBorne affects around 5.3 billion Bluetooth-enabled devices. The immediate mitigation for BlueBorne is to patch the device, if there’s
Publish At:2017-09-15 23:05 | Read:4629 | Comments:0 | Tags:Exploits Internet of Things Vulnerabilities BlueBorne Blueto

More on Bluetooth Ingenico Overlay Skimmers

This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store self-checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, a
Publish At:2017-02-27 02:20 | Read:2679 | Comments:0 | Tags:Other Bluetooth Ingenico overlay skimmer ISC-250 self-checko

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards
Publish At:2016-12-13 18:40 | Read:3047 | Comments:0 | Tags:Application Security Data Protection Bluetooth Connected Dev

Self-Checkout Skimmers Go Bluetooth

This blog has featured several stories about payment card skimming devices designed to be placed over top of credit card terminals in self-checkout lanes at grocery stores and other retailers. Many readers have asked for more details about the electronics that power these so-called “overlay” skimmers. Here’s a look at one overlay skimmer  e
Publish At:2016-10-15 07:45 | Read:2754 | Comments:0 | Tags:Other Bluetooth Ingenico Ingenico self-checkout skimmer Inge

Inside Arizona’s Pump Skimmer Scourge

Crooks who deploy skimming devices made to steal payment card details from fuel station pumps don’t just target filling stations at random: They tend to focus on those that neglect to deploy various tools designed to minimize such scams, including security cameras, non-standard pump locks and tamper-proof security tape. But don’t take my word for
Publish At:2016-09-27 19:15 | Read:3988 | Comments:0 | Tags:Other Arizona Department of Agriculture Bluetooth gas statio

Hardware Hacking Week @ ERNW

Internal workshops are one of the reoccurring events at ERNW, that help us to gain knowledge in areas outside our usual expertise. One of the recent workshops which happened during the week from August 22nd-25th was Hardware Hacking. Held by Brian Butterly (@BadgeWizard) and Dominic Spill (@dominicgs), this workshop took place in two parts. Brian kickstarted
Publish At:2016-09-10 00:20 | Read:2843 | Comments:0 | Tags:ERNW Bluetooth Ubertooth victor

DEF CON 2016 – Bluetooth-based smart locks easy to hack

Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last week security researchers Ben Ramsey and Anthony Rose of Merculite Security demonstrated at the Def Con conference how it is easy to open some Bluetooth-based smart locks. The duo analyzed 16 smart locks from companies such as Ceom
Publish At:2016-08-14 07:05 | Read:2767 | Comments:0 | Tags:Breaking News Hacking Bluetooth def con IoT smart locks

10-Second Hack Delivers First Ever Malware to Fitness Trackers

A security researcher has developed a method by which one can exploit a vulnerability in FitBit fitness trackers and subsequently deliver malware to the target device in 10 seconds.FitBit (Source: PCMag)Axelle Apvrille (@cryptax), a malware researcher at network security firm Fortinet, has found that FitBit wearables are open on their Bluetooth ports, a prop
Publish At:2015-10-21 08:30 | Read:2402 | Comments:0 | Tags:Latest Security News Axelle Apvrille bluetooth FitBit hack H

Tracking a Bluetooth Skimmer Gang in Mexico

-Sept. 9, 12:30 p.m. CT, Yucatan Peninsula, Mexico: Halfway down the southbound four-lane highway from Cancun to the ancient ruins in Tulum, traffic inexplicably slowed to a halt. There was some sort of checkpoint ahead by the Mexican Federal Police. I began to wonder whether it was a good idea to have brought along the ATM skimmer instead of leaving it in t
Publish At:2015-09-27 11:50 | Read:7424 | Comments:0 | Tags:A Little Sunshine All About Skimmers Android atm skimmer Blu

BTCrawler – Bluetooth Diagnostic & Discovery Tool

BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth
Publish At:2015-06-27 19:30 | Read:3526 | Comments:0 | Tags:Hacking Tools Network Hacking bluetooth bluetooth device dis

RuberTooth - A complete Ruby porting of the ubertooth libraries and utilities.

Today, finally my ubertooth arrived and I immediately started hacking with it. I installed its libraries and tools both on OS X and on my Linux virtual machine, and after a while I noticed a few things: The compilation process is not well documented for newer versions of OS X, thus manual code patching here and there is required. Some of the tools are o
Publish At:2015-02-13 02:10 | Read:2551 | Comments:0 | Tags:hack library BLE bluetooth low energy bluetooth ubertooth ru

BlueScan – A Bluetooth Device Scanner

BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices without the requirement to pair.The tool works unobtrusively, ie without establishing a connection to the devices found and undetected. No
Publish At:2015-01-11 00:00 | Read:3949 | Comments:0 | Tags:Hacking Tools Network Hacking bluescan bluescanner bluetooth

BlueMaho Project – Bluetooth Security Testing Suite

BlueMaho is GUI-shell (interface) for a suite of tools best used for Bluetooth security testing. It is freeware, opensource, written on python, uses wxPython. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics.I did get interested in Bluetooth for a whi
Publish At:2014-12-16 07:40 | Read:3383 | Comments:0 | Tags:Hacking Tools Network Hacking bluemaho bluetooth bluetooth s

Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but of
Publish At:2014-12-11 14:15 | Read:3112 | Comments:0 | Tags:Intelligence Security Android BitDefender Bluetooth Hacking


Share high-quality web security related articles with you:)


Tag Cloud