Category: Hardware
-
Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen
What could possibly go wrong when your privacy and phone are given “selectively” without your knowledge or ability to intervene? What happens when Uber is hijacked? Or Uber uses this access unscrupulously? Security researcher Will Strafach recently revealed that Apple selectively grants (what’s known as an “entitlement“) Uber a powerful ability to use the newly…
-
Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones
Luckily, not many US Android phones. Just a matter of time before manufacturers install rootkits as a matter of course. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers. According to…
-
Watch Video: How Hacker Installs a Credit Card Skimmer in 3 Seconds
Watching this video shows exactly how fast and simple it is for thieves to alter a credit card terminal, almost in full view. So, be cautious when you use any ATM and always look carefully at the teller machine before using it. If you find that the machine has been tampered with, or if its card…
-
USB Thief — Self-projecting USB Trojan Is Here To Give You Nightmares
Rule of Thumb Never, never, never use usb drives from an unknown source. This includes buying cheap usb drives from unknown sources on eBay! So many interesting things are being pre-loaded these days. Tell your uncle with the nude pics on the usb drive that you’ll pass. BTW, do we need to have a conversation…
-
Kaspersky Researcher Shows How He Hacked His Hospital While Sitting In His Car – fossBytes
Please note that he noticed the potential security risks inherent in the hospital’s system and medical equipment and got permission to run tests to expose the vulnerabilities. When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he/she uses. With advancement in technology, these equipment have become…
-
Uber tests out using smartphones to monitor driver behavior | Ars Technica
So, what could possibly go wrong? Is anyone else weirded out by this? Uber announced today that it will monitor some of its drivers’ behavior for things like excessive speeding or distracted driving. Starting with a trial in Houston, the program will use Uber drivers’ own smartphones to provide data to the company. The company will use a phone’s…
-
Zero-Day Flaw Found In ‘Linux Kernel’ Leaves Millions Vulnerable
Zero-Day Flaw Found In ‘Linux Kernel’ Leaves Millions Vulnerable A new critical zero-day vulnerability has been discovered in the Linux kernel that could allow attackers to gain root level privileges by running a malicious Android or Linux application on an affected device. The critical Linux kernel flaw (CVE-2016-0728) has been identified by a group of…
-
First Click: The quietest story of CES is also the biggest | The Verge
What happens to humans when all things move like information? Are we prepared to play this out without setting any groundwork and without mitigating and reducing the consequences of an all-automated society? So what happens when the robots reduce the cost and time of moving physical objects to not a lot and pretty fast? When…
-
Get A Glimpse Of The Cyber Threat Landscape For 2016 And Beyond | Hacked
Here’s a rundown of the cyber threat landscape for 2016 and beyond, courtesy of a report from Intel security. Coming In 2016 The 2016 predictions covers threats from ransomware, infrastructure attacks, attacks on automobile systems and the sale and warehousing of stolen data. • Hardware: Attacks on hardware and firmware will continue while the market…
-
Does Safely Ejecting From a USB Port Actually Do Anything?
Does Safely Ejecting From a USB Port Actually Do Anything? Is there any harm to be incurred by just pulling a flash drive out? Why do we need safe removal at all? Source: Does Safely Ejecting From a USB Port Actually Do Anything?