How can you build a device that gives you remote access to a connected LAN? (Not VPN) [on hold]

I was wondering how a device (eg. RPi or similar board could be built/configured in a way that when you plug it to a LAN (or connect Wifi) it let’s you remotely access the LAN (like VPN, but without the ports open on the main… Continue reading How can you build a device that gives you remote access to a connected LAN? (Not VPN) [on hold]

Why is iPhone’s internal storage so hard to crack/decrypt?

I’ve heard about a rule in Information Security, that once a hacker has access to your physical machine, then it’s all over. However, there seems to be a big exception to this rule: iPhones.

It was all over the news a while back that the CIA (or the FBI or something) could not access information from a terrorist’s phone for their counter-terrorism ops. They had to ask Apple to create them an unlocking program that could unlock the phone for them.

My question is, why are iPhones so hard to hack?

Continue reading Why is iPhone’s internal storage so hard to crack/decrypt?

Could it be possible to hijack physical finger prints in digital form and use them to gain access to other devices and locations?

With more and more devices accepting finger prints in place of passwords, could it be possible to “keylog” these finger prints on mobile devices, for example, by installing a rogue application and then reproducing that finger… Continue reading Could it be possible to hijack physical finger prints in digital form and use them to gain access to other devices and locations?

Leftover Factory Debugger Doubles as Android Backdoor

A researcher has found a backdoor, which he calls Pork Explosion, in an Android bootloader built by Foxconn. Continue reading Leftover Factory Debugger Doubles as Android Backdoor