HackDig : Dig high-quality web security articles for hackers

Palm-sized pwnage: Ars tests the Pwn Plug R3

Imagine for a moment the following scenario: you're the manager for a busy bank branch in a major city. You come back from lunch and are told by one of your employees that someone from corporate IT dropped by to check on a reported problem with a branch PC. You don't remember putting in a trouble ticket with IT, but apparently the guy left after looking
Publish At:2015-02-10 21:25 | Read:4609 | Comments:0 | Tags:Features Risk Assessment Technology Lab Penetration testing

Did the government hack a CBS journalist? Maybe. [Updated]

Update: Sharyl Attkisson has contacted Ars with comments, corrections and clarifications. We've integrated factual corrections into the story, as well as her comments—and citations and our own analysis in response to those comments where appropriate.Sharyl Attkisson was hacked. The computers used by the former CBS News investigative reporter were found to
Publish At:2014-11-07 16:00 | Read:3992 | Comments:0 | Tags:Features Law & Disorder Risk Assessment

iPwned: How easy is it to mine Apple services, devices for data?

Apple executives never mentioned the word "security" during the unveiling of the iPhone 6, iPhone 6+, and Apple Watch yesterday, choosing to focus on the sexier features of the upcoming iOS 8 and its connections to Apple's iCloud service. But digital safety is certainly on everyone's mind after the massive iCloud breach that resulted in many celebrity nude
Publish At:2014-09-10 22:30 | Read:11947 | Comments:0 | Tags:Features Risk Assessment Technology Lab icloud

Inside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother

It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted.This wasn't too surprising. In Deibert's world, these kinds of things occasionally get whispered through the grapevine, always second-hand. But this time he was sitting on a panel with John Adams,
Publish At:2014-08-11 21:16 | Read:5977 | Comments:0 | Tags:Features Law & Disorder Risk Assessment government hackers w


Tag Cloud