JD-HITBSecConf2018: Technical trainings, talks, exhibitions, competitions

HITB, organizer of the popular HITB Security Conference series, is collaborating with JD.com to bring its popular JD – HITB Security Conference to China for the first time later this year. JD-HITBSecConf2018 – Beijing will take place in Kem… Continue reading JD-HITBSecConf2018: Technical trainings, talks, exhibitions, competitions

Your Android phone says it’s fully patched, but is it?

How do fully-maintained (i.e., patched) Android phones end up getting exploited? Searching for an answer to that question spurred security researchers to analyze thousands of Android firmwares for the presence of hundreds of patches. Their research led… Continue reading Your Android phone says it’s fully patched, but is it?

Establishing covert communication channels by abusing GSM AT commands

Security research often starts as a hobby project, and Alfonso Muñoz’s and Jorge Cuadrado’s probe into mobile privacy is no exception. The duo, who’s scheduled to reveal the results of their research at the Hack in the Box Conference … Continue reading Establishing covert communication channels by abusing GSM AT commands

Hacking intelligent buildings using KNX and Zigbee networks

A great many of us are living, staying or working in “smart” buildings, relying on automated processes to control things like heating, ventilation, air conditioning, lighting, security and other operation systems. We expect those systems to… Continue reading Hacking intelligent buildings using KNX and Zigbee networks

Backdooring connected cars for covert remote control

We’ve all known for a while now that the security of connected cars leaves a lot to be desired. The latest proof of that sad state of affairs comes from Argentinian security researchers and hackers Sheila Ayelen Berta and Claudio Caracciolo. The … Continue reading Backdooring connected cars for covert remote control

Hack In The Box announces keynote speakers for 2018 Amsterdam event

Hack In The Box Security Conference (HITBSecConf) is returning to Amsterdam in April this year with more than 70 speakers who will take to stage. This year’s marks the 9th annual HITBSecConf in Europe, and will run from April 9th to 13th at the NH Gran… Continue reading Hack In The Box announces keynote speakers for 2018 Amsterdam event

HITB Security Conference in Amsterdam is all about advanced research

The agenda for Day 2 of the 9th annual HITB Security Conference in The Netherlands has been announced with even more advanced research including new sandbox evasion techniques, a ground breaking method for establishing covert channels over GSM mobile n… Continue reading HITB Security Conference in Amsterdam is all about advanced research

How cybercriminals abuse the travel and hospitality industry

The travel and hospitality industry suffers billions of losses each year due to fraud. “With the right combination of other underground services (compromised accounts, credit cards, etc.) it is possible to cover almost every aspect of the holiday… Continue reading How cybercriminals abuse the travel and hospitality industry

The future of macOS security: Baked-in protection and third-party tools

Anyone in the information security industry who’s interested in Mac security probably knows who Patrick Wardle is. Apart from being Chief Security Researcher at Synack, he’s also the creator of a number of security tools for macOS, which he makes available for free on his Objective-See project site. He has recently scaled back at his traditional 9-to-5 job so that he could dedicate more time and energy to pursuing his passions: to create new free … More Continue reading The future of macOS security: Baked-in protection and third-party tools

Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide effective countermeasures, other approaches for tricking wireless clients into automatically associating with a rogue access point are wanted. Enter Lure10 – a new attack that, by taking advantage of Wi-Fi Sense, tricks wireless devices running Windows into doing exactly that. What is Wi-Fi Sense? Wi-Fi Sense, enabled by default on … More Continue reading Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices