background preloader


Facebook Twitter

Axel Andrerkorn

Hackaday sur Twitter : "DOLPi is a #RaspberryPi polarimetric camera for detecting invisible things. On #HackadayIO. DOLPi - RasPi Polarization Camera. The project's blog is at:

DOLPi - RasPi Polarization Camera

Hacking home networks by compromising a Nest thermostatSecurity Affairs. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers.

Hacking home networks by compromising a Nest thermostatSecurity Affairs

Security experts from TrapX Security demonstrated how to hack an internet-connected thermostat produced by Nest, a firm controlled by Google. The researchers made much more, by hacking the Nest thermostat they gained control of other devices sharing the same home network. The hack is not simple to implement because the attack chain starts with a physical access to the device. Beware the militarization of cyberspace. Illustration picture.

Beware the militarization of cyberspace

(REUTERS/Kacper Pempel) Wireless Aerial Surveillance Platform, the DIY Spy Drone. The Wireless Aerial Surveillance Platform is a small DIY drone that has the capability to crack Wi-Fi passwords, eavesdropping on Wi-Fi passwords, eavesdropping on cell phone calls and read text messages.

Wireless Aerial Surveillance Platform, the DIY Spy Drone

h2hc2014-reversing-firmware-radare-slides. Index of / Inside_spying_v1.4. HubCap. Researchers find way to hack Gmail with 92 percent success rate. Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information.

Researchers find way to hack Gmail with 92 percent success rate

Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. McAfee report on the Global Cost of Cybercrime. McAfee issued a new report estimating the global cost of cybercrime, a lucrative industry that despite partial data could be costing the world economy as much as $575 billion annually.

McAfee report on the Global Cost of Cybercrime

The Estimating the Global Cost of Cybercrime report has been prepared using multiple sources, from government to academic organizations trying to evaluate the direct and indirect cost. “Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the global economy from cybercrime is more than $400 billion.1 A conservative estimate would be $375 billion in losses, while the maximum could be as much as $575 billion.”

OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014. Legit or hack? TrueCrypt posts mysterious update. VoIP made in germany by AVM and Sipgate. Heute war Forschungssamstag.

VoIP made in germany by AVM and Sipgate

TCP32764_backdoor_again. Fullnews. Here are some great hacking tutorials and resources that you can explore in your journey to learn hacking: 1.


Hacking Tutorials for Beginners By Unless you know how to hack, you cannot defend yourself from hackers. Break The Security(BTS) provides Penetration Testing and Ethical Hacking tutorials. BYOD: A Security Risk or A Matter of Employee Productivity - Hackers Online Club. BYOD: A security risk or a Matter of Employee Productivity Wherever you go, you always keep your device (Smartphone, laptop, PDAs) with you.

BYOD: A Security Risk or A Matter of Employee Productivity - Hackers Online Club

With evolving Smartphone concept, a BYOD (Bring Your Own Device) trend becomes popular in organizations. The concept of BYOD comes, when employees carry their personal device at the workplace, and connect to secure corporate network. At workplace, organizations should consider BYOD policy to make their employees secure and help IT department in managing such devices. A proper implementation of BYOD policy helps to make transparent network security by ensuring that employees are still obeying according to company governance policy and company security parameters. BYOD policy comprises the security requirements for each personal device, which is used by employee in the organization. The more products and services become accessible via mobile platform; security aspect becomes difficult for both organization and employee. Homepage. Asterisk for Raspberry Pi. Jailbreak 7, 7.0.3, 7.0.4 untethered for iPhone 5s, 5c, 5, iPad and iPod touch (Guide) - Redsn0w, Redsnow Jailbreak 7.0.4 - 7.0.3 - 6.1.3 - 6.1.4 untethered.

Sunday, December 22, 2013 Jailbreak iOS 7 with evasi0n7 untethered guide!

Jailbreak 7, 7.0.3, 7.0.4 untethered for iPhone 5s, 5c, 5, iPad and iPod touch (Guide) - Redsn0w, Redsnow Jailbreak 7.0.4 - 7.0.3 - 6.1.3 - 6.1.4 untethered

So we're really surprised with the new this morning about the iOS 7.x jailbreak released by evad3rs team. Evasi0n7 gives you the ability to jailbreak your iOS 7.x device in few minutes. Below is a full step-by-step guide to show you the whole jailbreak process! STEP 1: Download Evasi0n7 for Mac OS X/Windows. STEP 2: Download your iOS 7.x.x from our download page. WhatsApp-Backup speichert Klartext bei Apple. 2013-ExploitKitsKrawlerFramework. 2013-Pcap2bubblesProject-LT. CVE-2013-3893 – Analysis of the New IE 0-Day. By Gal Badishi | October 7, 2013 Recently, an exploit targeting a 0-day vulnerability in Internet Explorer has been spotted in the wild.

This vulnerability exists in all versions of Internet Explorer, from IE 6 to IE 11, but the attacks found in the wild only target IE 8 and 9 on Windows XP and Windows 7, and are believed to be part of an APT campaign targeting the Asia-Pacific region. Hacker community. Alert Tube – Monitor anything on the Net. If you are tied to your cell phone to monitor weather, calendar events and stocks, the Alert Tube could be the next gadget you need. Cole Stryker: Hacking The Future.

Cole Stryker's Hacking the Future: Privacy, Identity, and Anonymity on the Web , a new book tackling the war on online anonymity is on shelves this week. In this excerpt, Stryker looks at how certain groups and individuals are creating new platforms that promote open communication online. Rip It Up and Start Again After its big leak of U.S. diplomatic cables into the public domain, WikiLeaks has had some trouble finding a Web hosting company.

Waiting for Mobile Malware Wave. For example, the Apple iPhone last year saw its first Trojan to be distributed via the Internet. Still, that was more "script-kiddie prank program" than "serious crimeware". Heck, it wasn't even the first Internet-based mobile threat – technically, you could argue the 2006 Eliles.A worm has that distinction. Halfway through 2009, there hasn't yet been any major outbreaks of Internet-distributed mobile malware. College researchers hack government drone with $1,000 GPS spoofer. Pen Testing Christmas Hacking Challenge: Grandma Got All Hax0red by a Reindeer... Or Did She? Hacker Fantastic: Hacking Embedded Devices: For Fun & Profit. I began a research project into a popular consumer broadband device over 12 months ago.


Pearltrees videos. Help.