Hackers can use Fax machines to inject malware into a targeted network

By Waqas
Think twice before sharing your fax number with someone. Many corporations provide their fax number in the contact information page on the websites. After all, it is considered completely harmless to share fax number with other information lik… Continue reading Hackers can use Fax machines to inject malware into a targeted network

Monday, Aug. 13, Dtex, Insider Threat, Privacy in the News: eWeek Reviews Dtex; DefCon Draws Attention to Election Security

We are less than three months away from midterm elections in the US, a timeline that is not lost on the hacking community. With the conclusion of the Black Hat and DefCon conferences last week, the US is now even more focused on election and voting sec… Continue reading Monday, Aug. 13, Dtex, Insider Threat, Privacy in the News: eWeek Reviews Dtex; DefCon Draws Attention to Election Security

DoD unveils ‘Hack the Marine Corps’ bounty program

A new bug bounty program intended to find vulnerabilities in the Marine Corps’ public-facing websites was unveiled in Las Vegas Monday. The Hack the Marine Corps program, which was jointly created by the Department of Defense (DoD) and vulnerability disclosure platform company HackerOne, was announced on August 12 with a live hacking event. Hackers discovered 75 unique vulnerabilities during the event and were awarded over $80,000. During the event, nearly 100 “hand-selected” hackers worked for 9 hours to expose vulnerabilities in the Marine Corps’ websites and public services. The hackers were split into offensive and defensive teams, and worked alongside Marines from the U.S. Marine Corps Cyberspace Command (MARFORCYBER).  The bug bounty program will run until August 26.  “Success in cybersecurity is about harnessing human ingenuity,” said HackerOne CEO Marten Mickos. “There is no tool, scanner, or software that detects critical security vulnerabilities faster or more completely than hackers. The Marine […]

The post DoD unveils ‘Hack the Marine Corps’ bounty program appeared first on Cyberscoop.

Continue reading DoD unveils ‘Hack the Marine Corps’ bounty program

Defcon: 11-year-old modifies Florida Presidential voting results

By Waqas
At the largest hacking conference in the world, Defcon 2018, there have been many surprising discoveries. However, the news that has shocked the United States is the hacking and modifications of election results by young kids. The 26th Defcon … Continue reading Defcon: 11-year-old modifies Florida Presidential voting results

ex-NSA Hacker Discloses macOS High Sierra Zero-Day Vulnerability

Your Mac computer running the Apple’s latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday.

Patrick Wardle, an ex-NSA hacker and now Chief Research… Continue reading ex-NSA Hacker Discloses macOS High Sierra Zero-Day Vulnerability

Hackers can manipulate Police body cam footages

By Waqas
Kiss goodbye to crucial evidence. Body cameras used by the law enforcement nowadays have already remained controversial but no one has, so far, attempted to assess the credibility of the device itself. But, at Defcon 2018, police body cameras … Continue reading Hackers can manipulate Police body cam footages

DEF CON’s Voting Village tests hacker-government collaboration

The national conversation on election security came into sharp focus Friday at a renowned hacker conference as U.S. officials and security researchers sought common ground in raising awareness of potential vulnerabilities in election equipment. The goal was to have a more transparent conversation about those vulnerabilities without spreading undue public fear about them. The Voting Village at DEF CON in Las Vegas, a room where white-hat hackers could tinker with voting machines and mock voter registration databases, was a high-profile test of that collaboration. “I’m here to learn,” Alex Padilla, California’s secretary of state, said before touring the village in the bowels of Caesars Palace hotel and casino. That mindset is important as state and local officials ramp up resources toward securing election infrastructure three months before the midterm elections. In advance of the 2016 presidential election, Russian hackers probed the IT systems of 21 states, and U.S. officials have […]

The post DEF CON’s Voting Village tests hacker-government collaboration appeared first on Cyberscoop.

Continue reading DEF CON’s Voting Village tests hacker-government collaboration

Hands-On: AND!XOR DEF CON 26 Badge

The AND!XOR team have somehow managed to outdo themselves once again this year. Their newest unofficial hardware badge for DEF CON 26 just arrived. It’s a delightful creation in hardware, software, and the interactive challenges built into both.

They call this the “Wild West of IoT”, a name that draws from the aesthetic as well as the badge-to-badge communications features. Built on the ESP32-ROVER module which brings both WiFi and Bluetooth to the party, the badges are designed to form a wireless botnet at the conference. Anyone with a badge can work to advance their level and take more and …read more

Continue reading Hands-On: AND!XOR DEF CON 26 Badge

Book Review: Social Engineering: The Science of Human Hacking

In his new book, “Social Engineering: The Science of Human Hacking, 2nd Edition,” Chris Hadnagy really hits the mark by providing a great overview of social engineering techniques, explaining how and why they work, and giving the reader ple… Continue reading Book Review: Social Engineering: The Science of Human Hacking