This may sound crazy, but it’s true!
The war for "most-subscribed Youtube channel" crown between T-Series and PewDiePie just took an interesting turn after a hacker yesterday hijacked more than 50,000 internet-connected printers worldwide to print out flyers asking everyone to subscribe to PewDiePie YouTube channel.
PewDiePie, whose real name is Felix Kjellberg, is a famous YouTuber from
Posted in cyber security, hack printer, hacking Youtube account, Internet of things, network hacking, pewdiepie, printer hacking, Shodan search engine, youtube channel | Comments (0)
If your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enough to make your life easier, their smart behavior could also be leveraged by hackers to steal data, invade your privacy or spy on you, if not secured properly.
One such experiment has recently been performed by a team of student hackers, demonstrating a new attack method to turn smart devices
Posted in google tracking, hacking smart device, Hacking Smart TV, Internet of things, smart device, Smartphone, Technology News | Comments (0)
Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car’s functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.
No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.
Posted in car hacking, hacking news, Internet of things, Smart Car Hacking, Vulnerability | Comments (0)
In-brief: Close to five billion “fuzzing” tests conducted during 2016 reveal protocols used by industrial control systems, vehicles and Internet of Things devices to be weaker, on average, with many crashing hundreds of times and revealing vulnerabilities that could be used by malicious actors. A study of 4.8 billion automated…
Read the whole entry… »
Posted in connected devices, critical infrastructure, fuzzing, Internet of things, protocol, published research, Reports, software, software development, supply chain, survey, Top Stories, trends, vulnerabilities | Comments (0)
I think we should stop going crazy over the smart things unless it’s secure enough to be called SMART—from a toaster, security cameras, and routers to the computers and cars—everything is hackable.
But the worst part comes in when these techs just require some cheap and easily available kinds of stuff to get compromised.
Want example? It took just cheap magnets purchased from Amazon online
Posted in hacking news, hacking smart device, hacking smart gun, Internet of things, smart device, smart gun | Comments (0)
If you are hoverboard rider, you should be concerned about yourself.
Thomas Kilbride, a security researcher from security firm IOActive, have discovered several critical vulnerabilities in Segway Ninebot miniPRO that could be exploited by hackers to remotely take “full control” over the hoverboard within range and leave riders out-of-control.
<!– adsense –>
Segway Ninebot miniPRO is a
Posted in Bluetooth hacking, electric scooter, Hoverboard, Internet of things, Password bypass, Segway miniPRO | Comments (0)
Security researchers have discovered a critical remotely exploitable vulnerability in an open-source software development library used by major manufacturers of the Internet-of-Thing devices that eventually left millions of devices vulnerable to hacking.
The vulnerability (CVE-2017-9765), discovered by researchers at the IoT-focused security firm Senrio, resides in the software development
Posted in buffer overflow vulnerability, gSOAP toolkit, hacking news, Internet of things, iot devices, remote code execution, smart device, software development, Vulnerability | Comments (0)