Hacking An Arduino NFC Reader With WebUSB

When [gdarchen] wanted to read some NFC tags, he went through several iterations. First, he tried an Electron application, and then a client-server architecture. But his final iteration was to make a standalone reader with an Arduino and use WebUSB to connect to the application on the PC.

This sounds …read more

Continue reading Hacking An Arduino NFC Reader With WebUSB

Apple iOS 13.3 is here, bringing support for keyfobby authentication

Bullet-proof authentication is just a tap away! Continue reading Apple iOS 13.3 is here, bringing support for keyfobby authentication

This Week in Security: Tegra Bootjacking, Leaking SSH, and StrandHogg

CVE-2019-5700 is a vulnerability in the Nvidia Tegra bootloader, discovered by [Ryan Grachek], and breaking first here at Hackaday. To understand the vulnerability, one first has to understand a bit about the Tegra boot process. When the device is powered on, a irom firmware loads the next stage of the …read more

Continue reading This Week in Security: Tegra Bootjacking, Leaking SSH, and StrandHogg

There’s More To Designing A PCB Business Card Than Meets The Eye

A curious custom that survives from the pre-computer era is that of the business card. If you walk the halls at a trade event you’ll come a way with a stack of these, each bearing the contact details of someone you’ve encountered, and each in a world of social media …read more

Continue reading There’s More To Designing A PCB Business Card Than Meets The Eye

Google patches bug that let nearby hackers send malware to your phone

Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim’s phone

Continue reading Google patches bug that let nearby hackers send malware to your phone

Revisiting The BlackHat Hack: How A Security Conference Was Pwned

Does anyone remember the Black Hat BCard hack in 2018? This hack has been documented extensively, most notoriously by [NinjaStyle] in his original blog post revealing the circumstances around discovering the vulnerability. The breach ended up revealing the names, email addresses, phone numbers, and personal details of every single conference …read more

Continue reading Revisiting The BlackHat Hack: How A Security Conference Was Pwned