Skip to main content

Security

Oil industry has become hackers' favourite because of potential to create blackouts or spills

posted onJune 12, 2015
by l33tdawg

Hackers have increasingly been targeting oil companies, given the prospect that they could take control of the energy industry's deadly oil equipment along with sensitive data.

Bloomberg, citing various surveys and experts, reported that hackers have made the energy industry a favourite target due to its strategic and economic importance.

Discovering connections between attackers

posted onJune 5, 2015
by l33tdawg

In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.

Honeypots - fake systems designed to look like the real thing - can be used for many different purposes. One of these is to determine what attackers are after, their capabilities and the tactics they use to achieve their goals, and this is why Hayati set up thirteen Smart Honeypots in different geographic regions of Amazon Web Services and Google Cloud (America, Europe, Asia and Oceania).

This hacked toy can open many garage doors in seconds

posted onJune 5, 2015
by l33tdawg

Have you put much thought lately into what’s stored in your garage? If you have valuables in there next to your car, you might want to think about the hacking potential of your garage door. As it turns out, even your children’s old toys can be ideal for hacking into your home.

Samy Kamkar, a security researcher, has found a way to hack a common Mattel toy to turn it into a universal garage door opener. The toy Kamkar used, IM Me, is a discontinued pocket computer. It allows children to chat with pals who are nearby.

As federal agency reels from massive data breach, Chinese hackers blamed

posted onJune 5, 2015
by l33tdawg

The US government is badly leaking data. And China, the prime suspect in the latest data breach, isn't helping.

The most recent victim of a massive data breach is the Office of Personnel Management (OPM), the federal agency responsible for vetting about 90 percent of the people for working in the federal government.

The federal agency said Thursday its systems were breached in April That vetting data is reportedly safe, said officials, but performance reviews and job assignments data may have been taken.

New Guidance Aims to Plug Peepholes in City Surveillance Systems

posted onJune 2, 2015
by l33tdawg

A Commerce Department standards body has released preliminary guidelines for masking the personal data of individuals captured by traffic sensors, speed cameras and other Internet-connected government systems.

Coincidentally, the publication came out the day a Spanish researcher demonstrated that any stalker can monitor the driving habits of customers patronizing dozens of European parking lots. An unnamed major provider of parking management systems allegedly has not been implementing typical security settings.

Hackers Scan All Tor Hidden Services To Find Weaknesses In The 'Dark Web'

posted onJune 2, 2015
by l33tdawg

If you go down to the deep web today, you’ll be following hot on the heels of a digital beast. In a matter of hours last week, the entire semi-anonymising Tor network, where activists and criminals alike try to hide from the gaze of their respective authorities, was traversed by PunkSPIDER, an automated scanner that pokes websites to uncover vulnerabilities.

New Android NFC Attack Could Steal Money From Credit Cards Anytime Your Phone Is Near

posted onJune 1, 2015
by l33tdawg

Your NFC capable Android smartphone could be the newest weapon hackers use to steal money from the credit cards in your pocket, researchers find.  In a presentation at Hat In The Box Security Conference in Amsterdam, security researchers Ricardo J. Rodriguez and Jose Vila presented a demo of a real world attack, to which all NFC capable Android phones are vulnerable. This attack, delivered through poisoned apps, exploits the NFC feature allowing unethical hackers to steal money from victims’ credit cards anytime the cards are near the victims' phone.

HITB Haxpo Kicks Off With Richard Thieme’s Call To InfoSec Community To ‘Think Beyond The Edges’

posted onJune 1, 2015
by l33tdawg

“Think beyond the edges, because the edges are where new things come,” urged Richard Theime in the opening keynote for Hat In The Box Haxpo in Amsterdam. The former priest gone author and futuristic technology guru is well known within the InfoSec community and considered a “father figure” of the hacking convention circuit, keynoting at events such as DefCon and BlackHat.