2600
440 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Kristos Stavropoulos from Network security
Scoop.it!

Android app turns smartphones into hacking machines | Secfence Blog

Android app turns smartphones into hacking machines | Secfence Blog | 2600 | Scoop.it
A good news for all android dominated security nerds out there! At DefCon, Itzhak Zuk Avraham, also known by the handle @ihackbanme showed off the new hacking tool. The tool is called “The Android Network Toolkit,” named Anti for short.

Via shabgard
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Peer2Politics
Scoop.it!

Coding Freedom: an anthropologist understands hacker culture

Coding Freedom: an anthropologist understands hacker culture | 2600 | Scoop.it
Biella Coleman is a geek anthropologist, in both senses of the epithet: an anthropologist who studies geeks, and a geek who is an anthropologist.

Via jean lievens
more...
No comment yet.
Rescooped by Kristos Stavropoulos from MarketingHits
Scoop.it!

Internet Explorer Vulnerability Allows Hackers to Track Mouse Movements

Internet Explorer Vulnerability Allows Hackers to Track Mouse Movements | 2600 | Scoop.it

A vulnerability in different versions of Microsoft's widely used browser Internet Explorer can allow hackers to track the movements of your mouse.

This can potentially reveal sensitive data introduced via virtual keyboards, which are used precisely to avoid data theft via another online threat: key stroke loggers. Spider.io found out that Internet Explorer versions 6 to 10 are vulnerable to this kind of exploitation. What's worse, hackers could potentially track your movements even if the I.E. window is minimized.

This vulnerability is also apparently very easy to take advantage of. All a hacker needs to do is buy a display ad on any webpage and wait until a user visits it. If the tab remains open, the hacker has continuous access to your mouse movements.


Via Brian Yanish - MarketingHits.com
more...
No comment yet.
Rescooped by Kristos Stavropoulos from MarketingHits
Scoop.it!

Firesheep addon allows the clueless to hack Facebook, Twitter over Wi-Fi

Firesheep addon allows the clueless to hack Facebook, Twitter over Wi-Fi | 2600 | Scoop.it

If you thought that capturing a user's social media session was only done by skilled hackers, now the Firesheep addon can allow even the truly clueless to become an Internet griefer.

 

Even if you were drunk and surfing at a Wi-Fi hotspot, you probably wouldn't stand up and shout your username and password for anyone who might want it. But an attacker does not need to find out your username and password. If you thought that capturing a user's social media session was only done by skilled hackers, now the Firesheep addon can allow even the truly clueless to become an Internet griefer.

 

If you were at a Wi-Fi hotspot, you probably would have no options and no encryption at all. Although many websites give lip service about how important their users' privacy and security is to them, very few have their entire site encrypted with HTTPS. Most sites encrypt the username and password during the login process, but most of those sites stop encrypting and protecting the user right there. As soon as a user moves on to a regular HTTP page on the site, an attacker can sniff and capture the user's cookie information.

 

Many of us are busy multitasking, so we log into Twitter or Facebook, or even Flickr, and then move on to surf other sites without first logging out of those accounts. If any of those future sites have a Twitter or Facebook widget, or even a Flickr image embedded, if you didn't log out of those sites before continuing to surf, then HTTP session jacking, also called "sidejacking," can happen and leak the user's cookie. Security researchers explained that if a person can steal the cookie, then they can steal your session and allow them to do anything the user could do on the site.

 

Gust MEES: a MUST READ for Mac, Linux and Windows users!!!

 

Read more:

http://blogs.computerworld.com/17226/firesheep_addon_allows_the_clueless_to_hack_facebook_twitter_over_wi_fi

 


Via Gust MEES, Brian Yanish - MarketingHits.com
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Peer2Politics
Scoop.it!

Culture Hacking: The Future of Organizational Storytelling

Culture Hacking: The Future of Organizational Storytelling | 2600 | Scoop.it

A couple of months ago nearly 600 members of the Get Storied tribe gathered online for Reinvention Summit 2: Storytelling’s Biggest Online Conference. This included 20 sessions from the world’s leading storytelling experts.


Via jean lievens
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Hackaday
Scoop.it!

Vodafone femtocells hacked, root password revealed

Vodafone femtocells hacked, root password revealed | 2600 | Scoop.it
As phone systems have evolved over time, the desire to break them and exploit their usage continues to flourish.
Via Avrel
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Hackaday
Scoop.it!

GSM hacking with prepaid phones

GSM hacking with prepaid phones | 2600 | Scoop.it
Want to listen in on cellphone calls or intercept test messages? Well that’s a violation of someone else’s privacy ...
Via Avrel
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Hackaday
Scoop.it!

Hacking the Chronos and exploring the ISM bands

Hacking the Chronos and exploring the ISM bands | 2600 | Scoop.it
Take a few minutes and watch [atlas of d00m], at Shmoocon 2012, presenting information about using the RF dongle from the Chronos to explore ISM bands. Admittedly, I’m not very familiar with many of the things he discusses, but the words make sense.

Via Avrel
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Silicon Beach
Scoop.it!

Why Los Angeles Will Outpace Silicon Valley As The Tech Startup Capital - Forbes

Why Los Angeles Will Outpace Silicon Valley As The Tech Startup Capital - Forbes | 2600 | Scoop.it
Video When I moved to Los Angeles in 2008 from San Francisco, I wasn't very excited about the move because I'm a technologist and moving away from the tech hub of the world to the land of Botox seemed like a really bad career move.

Via Matt Wilhalme
more...
No comment yet.
Rescooped by Kristos Stavropoulos from 21st Century Learning and Teaching
Scoop.it!

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware | 2600 | Scoop.it

Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The bug, which can be used to gai...
Here's what the researchers found they could access:

TV settings and channel lists
SecureStorage accounts
Widgets and their configurations
History of USB movies
ID
Firmware
Whole partitions
USB drives attached to the TV


Gust MEES's insight:

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable! Protect YOUR computer(s) and Smartphone(s):

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Via Gust MEES
more...
Gust MEES's curator insight, December 12, 2012 4:00 PM

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable!

 

Protect YOUR computer(s) and Smartphone(s):

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Thybo Lingier's curator insight, December 31, 2013 9:51 AM

Company name: Samsung
Economic activity segment: Technology

Use of ICT: New technolgy combined with the internet and several other options. For example connecting your television with Facebook or Youtube

Objectives: Customer Satisfaction and Innovation

Rescooped by Kristos Stavropoulos from Video Breakthroughs
Scoop.it!

Opened Captions: Turning the spoken words on TV screens into streams of hackable data

Opened Captions: Turning the spoken words on TV screens into streams of hackable data | 2600 | Scoop.it

The new project provides a real-time API for closed captions, making it possible to code against what’s being said on TV right now — and enabling a broad range of applications.


Via Nicolas Weil
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Amazing Science
Scoop.it!

Hacking the Human Brain: The Next Domain of Warfare

Hacking the Human Brain: The Next Domain of Warfare | 2600 | Scoop.it

t’s been fashionable in military circles to talk about cyberspace as a “fifth domain” for warfare, along with land, space, air and sea. But there’s a sixth and arguably more important warfighting domain emerging: the human brain.

This new battlespace is not just about influencing hearts and minds with people seeking information. It’s about involuntarily penetrating, shaping, and coercing the mind in the ultimate realization of Clausewitz’s definition of war: compelling an adversary to submit to one’s will. And the most powerful tool in this war is brain-computer interface (BCI) technologies, which connect the human brain to devices.

Current BCI work ranges from researchers compiling and interfacing neural data such as in the Human Conectome Project to work by scientists hardening the human brain against rubber hose cryptanalysis to technologists connecting the brain to robotic systems. While these groups are streamlining the BCI for either security or humanitarian purposes, the reality is that misapplication of such research and technology has significant implications for the future of warfare.

Where BCIs can provide opportunities for injured or disabled soldiers to remain on active duty post-injury, enable paralyzed individuals to use their brain to type, or allow amputees to feel using bionic limbs, they can also be exploited if hacked. BCIs can be used to manipulate … or kill.


Via Daniel House, Dr. Stefan Gruenwald
more...
mdashf's curator insight, December 14, 2012 3:44 PM

Ethical Paradigms of science

Rescooped by Kristos Stavropoulos from Peer2Politics
Scoop.it!

Hacking Creativity

Hacking Creativity | 2600 | Scoop.it

One of the stranger articles Inc. magazine ever ran was a 2002 piece about the neuroscience of innovation. Actually, it wasn’t really about innovation as much as where and how innovators get their ideas. Only it wasn’t that either. It was really about what kind of peculiar mind-hacks top innovators use to come up with their ideas and—the strange part—it opens with a discussion of inventor and futurist Ray Kurzweil’s employment of lucid dreaming to solve vexing engineering problems.


Via jean lievens
more...
No comment yet.
Rescooped by Kristos Stavropoulos from Hackaday
Scoop.it!

Brute Force BIOS Hacking Using the Arduino

Brute Force BIOS Hacking Using the Arduino | 2600 | Scoop.it
This clever hack uses an Arduino to do a brute force attack on a computer’s BIOS. In theory, this technique could be used for other programs, but it’s use would be limited since there’s no way to account for too many wrong passwords.

Via Avrel
more...
Rescooped by Kristos Stavropoulos from Hackaday
Scoop.it!

Ask Hackaday: Building nano scale antennas

Ask Hackaday: Building nano scale antennas | 2600 | Scoop.it
As an RF engineering student, [Camerin] is usually tasked with pointless yet educational endeavors by his advisor and professors.

Via Avrel
more...
No comment yet.