HackDig : Dig high-quality web security articles for hacker

GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two Chinese security researchers have exploited vulnerabilities in the implementation of the GMR-2 standard that could be exploited to decrypt satellite phone communications in fractions of a second. The GMR-2
Publish At:2017-07-08 15:25 | Read:477 | Comments:0 | Tags:Breaking News Hacking encryption GMR-2 mobile Satellite sate

The Network of NewSat satellite telco firm was the ‘most corrupted’ of ever

The Network of NewSat satellite firm was the ‘most corrupted’ of ever, it was hacked by foreign hackers and it had interception kit in its data centre. The story demonstrates the high interest of spy agencies in hacking communication systems. Once upon a time, the Australian satellite company was deeply hacked by cyber spies that completely corru
Publish At:2016-08-29 12:40 | Read:845 | Comments:0 | Tags:Breaking News Cyber warfare Digital ID Hacking Intelligence

China ready to launch the first hack proof quantum communication satellite

China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications. Satellites have a crucial role in our digital society, almost every industry is benefiting from their services for this reason their security is a pillar of the cyber security strategy of governments worldwide. Attackers are posing
Publish At:2016-06-09 19:00 | Read:809 | Comments:0 | Tags:Cyber Crime Hacking Security hack proof quantum communicatio

Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage

During the latter part of 2015, Kaspersky researchers from GReAT (Global Research and Analysis Team) got hold of the missing pieces of an intricate puzzle that points to the dawn of the first Portuguese-speaking targeted attack group, named “Poseidon.” The group’s campaigns appear to have been active since at least 2005, while the very fir
Publish At:2016-02-09 18:25 | Read:1293 | Comments:0 | Tags:Blog Featured Research APT Brasil Brazil Cyber espionage Dig

Locating SAT based C&Cs

Recently, Kaspersky published a research about how a russian APT group use hijacked satellite links to anonymise their malware command-and-control (C&C) servers (Satellite Turla: APT Command and Control in the Sky). As they say in their blog post, I researched and published how to abuse satellite DVB-S/2 internet communications, the technique used during
Publish At:2015-10-29 00:10 | Read:1087 | Comments:0 | Tags:Blog BlackHat blueteam MiTM routing satellite seaairandland

How highly advanced hackers (ab)used satellites to stay under the radar

One of the world's most advanced espionage groups has already been caught unleashing an extremely stealthy trojan for Linux systems that for years siphoned sensitive data from governments and pharmaceutical companies around the world. Now researchers have discovered a highly unusual method that members of the so-called Turla group used to cover their tra
Publish At:2015-09-10 03:40 | Read:623 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab advanced persi

Reflective satellites may be the future of high-end encryption

Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a guarantee that two parties can exchange a secret key without knowing whether they're being overheard. This unencrypted-but-secure form of key exchange circumvents one of the potential shortcoming
Publish At:2015-08-25 00:45 | Read:673 | Comments:0 | Tags:Risk Assessment Scientific Method lasers quantum cryptograph

Hacking the Iridium network could be very easy

At the last the Chaos Communication Camp, held in Zehdenick, Germany experts demonstrated how to hack the Iridium network and eavesdrop its pager traffic. At the last edition of the Chaos Communication Camp held in Germany the organizers distributed 4500 rad1o badges, powerful devices running a software that could be used to i
Publish At:2015-08-24 11:00 | Read:780 | Comments:0 | Tags:Breaking News Hacking Chaos Communication Camp 2015 Iridium

We Finally Know Something About What The Shadowy X-37B Will Do In Orbit

In an unprecedented disclosure from the DoD, we have finally been told at least something in regards to what the USAF’s secretive X-37B spaceplane’s goals are for its upcoming flight. Among other things, it will test an exotic form of thruster propulsion that could have huge implications for future space development. Spaceflightnow.com describes exactly how
Publish At:2015-06-09 16:15 | Read:885 | Comments:0 | Tags:Aerospace Military Technology 0xicf Advanced Extremely High

Torus, a milestone in massive surveillance

“Torus” a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes alliance. The researcher Duncan Campbell analyzed a document leaked by the NSA whistleblower Edward Snowden focusing his investigation on the a term used in the secret slides that could have re
Publish At:2015-06-03 06:35 | Read:1078 | Comments:0 | Tags:Breaking News Intelligence GCHQ Hacking NSA Satellite survei

Cybersecurity in the maritime industry, are our ports secure?

Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our society. In a recent post, I talked about attacks targeting SCADA systems will increase, and our ports are among critical infrastructure that makes large use of such systems. Let’
Publish At:2015-05-14 14:20 | Read:1265 | Comments:0 | Tags:Breaking News Hacking Security cyber security GPS Heartbleed

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure Map is a program to map every device exposed o
Publish At:2014-09-15 13:40 | Read:1347 | Comments:0 | Tags:Hacking Intelligence Deutsche Telekom Edward Snowden FiveEye

High-Risk flaws affect the NOAA Satellite System JPSS

The NOAA JPSS System is affected by thousands vulnerabilities, according to a memorandum from the Department of Commerce’s Office of the Inspector General. The Satellite systems at NOAA (National Oceanic and Atmospheric Administration) are affected by thousands of severe vulnerabilities that could be exploited by threat ac
Publish At:2014-09-11 06:20 | Read:979 | Comments:0 | Tags:Hacking Security critical infrastructure Heartbleed JPSS NOA

Hacking satellite communications equipment on passenger jets

Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Airplanes Can Be Hacked Through Wireless In-flight Entertainment System, this is not a new discovery as I explained in a post published more that one year ago and titled &
Publish At:2014-08-09 17:01 | Read:1278 | Comments:0 | Tags:Hacking Security aviation backdoors Entertainment System FAA


Share high-quality web security related articles with you:)


Tag Cloud