Phwning the boardroom: hacking an Android conference phone
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
JavaScript Web Service Proxies are an alternative to WSDL (Web Services Description Language) files for interacting with WCF Web Services. The proxy files function as a description of the webRead More →
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand out a bit more is the use ofRead More →
Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware is spread via a downloader, experts noticed that it isRead More →
Recent research on web security and related topics. Provided and maintained by members and friends of the Chair for Network and Data Security, Horst Görtz Institute, Ruhr-University Bochum. Do youRead More →
Many people don’t truly understand the extent to which computers control in the modern world. Everything from stoplights at busy intersections to power plants have automated systems, and for goodRead More →
WHEN CYBERSECURITY RESEARCHERS showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles’ brakes or hijack their steering, the results wereRead More →
The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the sourceRead More →
No hacking required, as these Israeli researchers demonstrate how to steal data through PC components. A series of side-channel-attacks that can steal encryption keys by watching acoustic, electric, and electromagneticRead More →
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is not interesting to know that what they didRead More →