Skip to main content

Home/ CSIA 459/ Group items tagged hacks

Rss Feed Group items tagged

Alexandr Yezersky

This Malicious Charger Can Hack Your iPhone | Diigo - 0 views

  •  
    This article describes the device created by a Georgia Research team, known as Mactans that hacks iPhones through a compatible charger.
Bob Lloyd

3D-printed button-bashing robot guesses phone PINs | Cutting Edge - CNET News - 1 views

  •  
    I thought this was interesting. Hacking has gone to another level of automation by using robotics to brute force hack the 4 digit pin on cell phones.
  •  
    It's nice to know my first thought when I started reading this of locking the phone after X number of unsuccessful attempts is what they suggested.
Cheryl Hoffman

Five Charged in Largest Hacking Scheme Ever Prosecuted in US | SecurityWeek.Com - 0 views

  •  
    The U.S. Attorney's Office today unsealed an indictment charging four Russians and a Ukrainian with a multi-million hacking scheme that netted 160 million credit card numbers from several major American and international corporations.
Lee Bry

Hack an iPhone in 60 seconds - 1 views

  •  
    Check this out. Just when you think it's safe to go into the water!
Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Amy Harding

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3 | Security Affairs - 28 views

  •  
    For your Week 6 discussion.
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Alexandr Yezersky

BeagleBoard.org - default | Diigo - 0 views

  •  
    A smaller version of the simple device known as the beagle board can be inserted into an apple charger to pose multiple security risks for the once secure hardware developer.
Alexandr Yezersky

Black Hat The World's Premier Technical Security Conference | Diigo - 0 views

  •  
    This is the website of Black Hat that lists the dates of the Las Vegas security conference, where the unveiling of the device known as Mactans (charger that is capable of hacking into an iPhone) will take place.
Rumnea Kelly

Insurgents Hack U.S. Drones - 0 views

  •  
    This was an interesting source that talks about how our adversary can utilized off the shelf programs to defeat the multi-million dollars system of our UAV programs.
Rumnea Kelly

Computing and Comms Driving UAVS - 0 views

  •  
    This article requires that you login into the UMUC Library in order to view it. It dealt with a more technical aspect of what the UAV is all about it. It contains drawings and addresses some ethical concerns.
Jessica Riedel

How to run your own NSA spy program - 2 views

  •  
    With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
  •  
    A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
  •  
    This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
Cheryl Hoffman

Phone hackers a threat to safety - 0 views

  •  
    Interesting article on how a hospitals phone network was hacked by someone using VOIP who then performed a DOS attack.
  •  
    This was an interesting article. I wish it explained how the attack was carried out. I am surprised that firewalls would not be a part of VOIP installation for large institutions. The treat has always been there. I am guessing that somebody cut costs up front and paid for it later. Maybe the attacker sold them the firewalls?
1 - 14 of 14
Showing 20 items per page