Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a variety of widely-used hobbyist drones and make them do your bidding. Why are such tools necessary As any technology, flying drones could be put to good use or can be misused to enable crimes and endanger the public and/or individuals. Terror attacks via drones, smuggling contraband into prisons, spying on … More Continue reading Icarus takes control of drones by impersonating their operators

Hack Naked TV – August 22, 2016

Event Viewer UAC bypass, AppWhitelisting Bypass, 80% of Android Devices vulnerable to Hijacking, PowerShell Open Sourced, and Tool of the Week! – DataSploit. Visit http://hacknaked.tv to get all the latest episodes! http://traffic.libsyn.com/hntvaudio/Hack_Naked_TV_-_August_22_2016_converted.mp3 Continue reading Hack Naked TV – August 22, 2016

Beware of browser hijacker that comes bundled with legitimate software

Lavians, a “small software vendor team,” is packaging its offerings with a variant of browser-hijacking malware Bing.vc. The company sells and offers for free different types of software (drivers and other kinds of utilities) on their own website, but also on popular download sites. Unfortunately, most of them come bundled with the aforementioned malware, which installs itself into Internet Explorer, Firefox, and Chrome without the user’s consent. Ad-injectors and browser hijackers are definitely a nuisance, … More Continue reading Beware of browser hijacker that comes bundled with legitimate software