HackDig : Dig high-quality web security articles for hacker

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:1023 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Popular hacking toolkit Metasploit adds hardware testing capabilities

The Metasploit hacking toolkit now includes a new hardware bridge that makes it easier for users to analyze hardware devices. The popular offensive hacking toolkit Metasploit now is powerful, it included a hardware bridge to conduct security tests on hardware. It is a great support to the users that have to test hardware, including IoT devices. Metasploit al
Publish At:2017-02-03 16:25 | Read:1078 | Comments:0 | Tags:Breaking News Hacking CAN Hardware Metasploit

Update your Belkin WeMo devices before they become botnet zombies

Owners of WeMo home automation devices should upgrade them to the latest firmware version, which was released this week to fix a critical vulnerability that could allow hackers to fully compromise them.The vulnerability was discovered by researchers from security firm Invincea in the Belkin WeMo Switch, a smart plug that allows users to remotely turn the
Publish At:2016-11-05 09:50 | Read:1512 | Comments:0 | Tags:Security Internet of Things Home Tech Hardware

Workstation software flaw exposes industrial control systems to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations.The software, known as Unity Pro, runs on PCs used by engineers and includes a simulator for testing code before deploying it to programmable logic controllers (PLCs). The
Publish At:2016-10-25 16:55 | Read:1343 | Comments:0 | Tags:Security Hardware

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness in RAM chips. The attack technique could also affect other ARM and x86-based devices and computers.The attack stems from the push over the past decade to pack more DRAM (dynamic random
Publish At:2016-10-24 22:35 | Read:1024 | Comments:0 | Tags:Security Hardware Android

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.The technique, developed by three researchers from State University of New York at Binghamton and the University of California in Riverside, can be used to bypass address space layout random
Publish At:2016-10-20 01:10 | Read:1023 | Comments:0 | Tags:Security Hardware CPUs and Processors exploit

Israeli startup says its new software would have prevented Tesla hack

Israeli startup Karamba Security today announced a new product for securing the electronic control units (ECUs) of connected and self-driving vehicles that it said could have prevented a recent Tesla hack.Karamba's Carwall software uses a vehicle's factory software settings to discover noncompliant code in a car's ECUs and automatically creates security
Publish At:2016-09-30 05:15 | Read:1535 | Comments:0 | Tags:Car Tech Security Hardware Hacking

Teleporting a photon leads researchers to quantum security

Come on, admit it. You've always wanted to have Scotty beam you up to the USS Enterprise.But it's unlikely that you will be teleported anywhere in this lifetime… unless you're a photon.And that could mean more secure communications in the foreseeable future.A group of physicists announced this week that they have successfully teleported a photon, which i
Publish At:2016-09-21 20:20 | Read:1327 | Comments:0 | Tags:Emerging Technology Hardware Security

Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON

Smart door locks, padlocks, thermostats, refrigerators, wheelchairs and even solar panel arrays were among the internet-of-things devices that fell to hackers during the IoT Village held at the DEF CON security conference in August.A month after the conference ended, the results are in: 47 new vulnerabilities affecting 23 devices from 21 manufacturers we
Publish At:2016-09-14 05:30 | Read:1002 | Comments:0 | Tags:Security Internet of Things Hardware

Today's supercomputers will get blown away by these systems

The Department of Energy says the $40 million it is investing in nearly two dozen multi-year projects will result in exascale computing systems that perform calculations on data 50 to 100 times faster than today's most powerful supercomputers.The DoE Exascale Computing Project says such high-performance computing systems can make at least a billion billi
Publish At:2016-09-09 16:00 | Read:1685 | Comments:0 | Tags:Hardware Education Analytics Data Center Security High Perfo

This USB stick will fry your unsecured computer

A Hong Kong-based technology manufacturer, USBKill.com, has taken data security to the "Mission Impossible" extreme by creating a USB stick that uses an electrical discharge to fry an unauthorized computer into which it's plugged."When the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges -- al
Publish At:2016-09-08 21:45 | Read:1588 | Comments:0 | Tags:Hardware Security

Nginx web server upgrade focuses on web security, JavaScript configuration

Security rules the day in version 10 of Nginx's enterprise-level web server, which features enhancements, including a web application firewall.Nginx Plus Release 10, available Tuesday, also introduces JavaScript-based scripting for configuration, IP transparency, and DSR (Direct Server Return) load-balancing.[ Use JavaScript in your dev shop? Inf
Publish At:2016-08-23 22:00 | Read:1754 | Comments:0 | Tags:Servers Hardware Internet Security

Sounds from your hard disk drive can even be used to steal a PC's data

Researchers have found a way to steal a PC’s data by using the mechanical noise coming from the hard disk drives inside.It’s not a very practical hack, but the scheme has been designed for “air-gapped” systems, or computers that have been sectioned off from the Internet.The researchers at Ben-Gurion University of the Negev in Israel have been stu
Publish At:2016-08-13 05:55 | Read:1360 | Comments:0 | Tags:Security Hardware

Taking stock of Apple's 2016 acquisitions

Apple’s acquisition this past week of Turi, a Seattle machine learning company that has its roots in the open source GraphLab project, brings to six the number of deals Apple has made this year that have gone public. So while Apple’s $2.5 billion in R&D spending during its recently completed second quarter represented a 25% increase over the
Publish At:2016-08-11 17:25 | Read:1711 | Comments:0 | Tags:Smartphones iOS Hardware Security Analytics Mergers and Acqu

High-security electronic safes can be hacked through power and timing analysis

Some consumer safes protected with electronic locks are quite easy to hack using basic techniques. Others, though, like those made to store guns, are designed to resist expert manipulation.However, one hacker demonstrated at the DEF CON security conference Friday that even high-security rated electronic safe locks are susceptible to side-channel
Publish At:2016-08-07 21:45 | Read:1390 | Comments:0 | Tags:Security Hardware Physical Security


Share high-quality web security related articles with you:)


Tag Cloud