Raspberry Pi launches PIXEL OS for Mac and PCs

Here’s the Raspberry Pi’s Christmas treat for tech community!

The Raspberry Pi Foundation has released an experimental version of its lightweight Linux-based Debian operating system called PIXEL OS that can run on most standard desktop computers ships… Continue reading Raspberry Pi launches PIXEL OS for Mac and PCs

Kiev Power Outage Linked To Cyber Attacks

A Kiev power outage last weekend in Ukraine has been linked to a cyber attack, which is worryingly similar to an attack that happened around the same time last year. Sub-stations and transmission stations have always been a weak point for nation-state attacks as EVERYTHING relies on them now. Plus with smart grids and remotely […]

The post…

Read the full post at darknet.org.uk

Continue reading Kiev Power Outage Linked To Cyber Attacks

Kautilya – Human Interface Device Hacking Toolkit

Kautilya is a human interface device hacking toolkit which provides various payloads for HIDs which may help with breaking into a computer during penetration tests. The Windows payloads and modules are written mostly in powershell (in combination with … Continue reading Kautilya – Human Interface Device Hacking Toolkit

Tesla Hack – Remote Access Whilst Parked or Driving

The big buzz on my Twitter this week was about the Tesla Hack carried out by a Chinese crew called Keen Security Lab. It’s no big surprise even though Tesla is known for being fairly security concious and proactive about it. With it being a connected car, that’s pretty important that any remote control capabilities […]

The post Tesla Hack…

Read the full post at darknet.org.uk

Continue reading Tesla Hack – Remote Access Whilst Parked or Driving

Oh, It’s On Sale! USB Kill to Destroy any Computer within Seconds

Remember Killer USB stick?

A proof-of-concept USB prototype that was designed by a Russian researcher, Dark Purple, last year, to effectively destroy sensitive components of a computer when plugged in.

Now, someone has actually created the Killer USB stick that destroys almost anything – such as Laptops, PCs, or televisions – it is plugged into.
<!– adsense –>
A Hong Kong-based technology

Continue reading Oh, It’s On Sale! USB Kill to Destroy any Computer within Seconds

In 2016 Your Wireless Keyboard Security Still SUCKS – KeySniffer

So you’d probably imagine that Wireless Keyboard Security is a 1998 problem and you shouldn’t even have to worry about that any more. And you’d be wrong – two-thirds of wireless keyboards, from MAJOR manufacturers are not even vaguely secure. It turns out, in 2016 when cryptography is mainstream, open-source and fairly easy to implement…

Read the full post at darknet.org.uk

Continue reading In 2016 Your Wireless Keyboard Security Still SUCKS – KeySniffer

Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping

We just cannot imagine our lives without smartphones, even for a short while, and NSA whistleblower Edward Snowden had not owned a smartphone since 2013 when he began leaking NSA documents that exposed the government’s global surveillance program.

Sno… Continue reading Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping

IoT Botnet — 25,000 CCTV Cameras Hacked to launch DDoS Attack

The Internet of Things (IoTs) or Internet-connected devices are growing at an exponential rate and so are threats to them.

Due to the insecure implementation, these Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, S… Continue reading IoT Botnet — 25,000 CCTV Cameras Hacked to launch DDoS Attack

Intel Hidden Management Engine – x86 Security Risk?

So it seems the latest generation of Intel x86 CPUs have implemented a Intel hidden management engine that cannot be audited or examined. We can also assume at some point it will be compromised and security researchers are labelling this as a Ring -3 level vulnerability. This isn’t a new issue though, people have been […]

The post Intel…

Read the full post at darknet.org.uk

Continue reading Intel Hidden Management Engine – x86 Security Risk?