Tag: Hacks
You are here: Home \ Hacks \ Page 4
‘Foreshadow” and other vulnerabilities in Intel processors can be exploited to steal sensitive information stored inside personal computers or personal clouds.
The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions.
Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable.
A “wave of litigation over IoT liability is on the horizon,” according to an attorney who has represented plaintiffs in the 2015 Jeep hack.
Sloppy Android developers not following security guidelines for external storage opens the door to device takeover and more.
The Vote Hacking Village invited attendees – including kids as young as six – to hack the voting infrastructure, including ballot machines, a voter database and more.
A malicious fax sent to an HP Inc. OfficeJet all-in-one inkjet printer can give hackers control of the printer and act as a springboard into an attached network environment.
Apple 0-Day allows hackers to mimic mouse-clicks for kernel access, despite mitigations.
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio.
123456789 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ...