Implementing Blockchain in Fanet to Restrict UAV Access to Restricted Zones (based on gps spoofing) [closed]

I’m exploring the implementation of blockchain technology within a Fanet (Flying Ad-Hoc Network) to control UAV (Unmanned Aerial Vehicle) access to restricted zones. The goal is to register authorized UAVs on the blockchain and prevent una… Continue reading Implementing Blockchain in Fanet to Restrict UAV Access to Restricted Zones (based on gps spoofing) [closed]

How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain test.com.
Think of this system as a &qu… Continue reading How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

Security Vulnerability of HTML Emails

This is a newly discovered email vulnerability:

The email your manager received and forwarded to you was something completely innocent, such as a potential customer asking a few questions. All that email was supposed to achieve was being forwarded to you. However, the moment the email appeared in your inbox, it changed. The innocent pretext disappeared and the real phishing email became visible. A phishing email you had to trust because you knew the sender and they even confirmed that they had forwarded it to you.

This attack is possible because most email clients allow CSS to be used to style HTML emails. When an email is forwarded, the position of the original email in the DOM usually changes, allowing for CSS rules to be selectively applied only when an email has been forwarded…

Continue reading Security Vulnerability of HTML Emails

Mom receiving texts with some private info daughter has not sent [closed]

I have received three texts from my daughter’s phone number – she is on an iPhone 14, I am on a Google Pixel 4. The first two texts came in on my car Android Auto – a week apart, but within minutes of the same time of day…and copies of t… Continue reading Mom receiving texts with some private info daughter has not sent [closed]

Hackaday Links: March 17, 2024

Hackaday Links Column Banner

A friend of ours once described computers as “high-speed idiots.” It was true in the 80s, and it appears that even with the recent explosion in AI, all computers have …read more Continue reading Hackaday Links: March 17, 2024

Isolating encrypted and unecnrypted Windows installations and protecting the boot loader

I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don’t want them to be able to access my wallets data in any way even if they have … Continue reading Isolating encrypted and unecnrypted Windows installations and protecting the boot loader

SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols

A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms.
The post SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols appeared first on SecurityWeek.
Continue reading SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols