Archive | Hardware Hacking


25 February 2010 | 6,659 views

US School Remotely Spying On Kids With Webcams

The big news that has been blowing up in the past week or so is about a relatively unknown school district in Pennsylvania, US that has been spying on its students using Macbook webcams. It has actually turned into a class action lawsuit and there is a lot of debate surrounding the story, the school [...]

Continue Reading


27 January 2010 | 12,061 views

Playstation 3 (PS3) Finally Hacked & Exploit Released

Ah finally some proof of the mythical Playstation 3 exploit released publicly. Sadly as always the lack of sales on the PS3 can be partially attributed to the lack of a homebrew scene (aka ability to pirate games). There have been rumours and some speculation about the PS3 finally being exploited with news breaking earlier [...]

Continue Reading


14 July 2009 | 11,361 views

Smart Grid Security Risks – Not So Smart Electricity Meters

You might recall we’ve discussed the security of Industrial Control Systems before, the latest ‘evolution’ is the so called Smart Grid. Which in all honestly, doesn’t seem to be very smart at all. In basic terms they are trying to turn the power-grid into a two way communication medium so consumers homes can report back [...]

Continue Reading


06 July 2009 | 49,177 views

Military Communications Hacking – Script Kiddy Style

Ah now this is interesting..and scary in a way. Script Kiddies with guns! Script kiddies going to war, or is it turning soldiers into script kiddies. Who knows. Anyway, the US military has decided to make their soldiers walking hackers, with an all-in-one super hacking device that can penetrate satellite signals, VoIP networks and normal [...]

Continue Reading


12 May 2009 | 4,717 views

Ensuring Data Security During Hardware Disposal

After our recent story about the trading of BlackBerries for data theft the issue has emerged again this time more towards the secure disposal of data stored on PC hard disks. If a company or organisation has a decent data/information security policy in place (Like ISO27001 for example) they should have a secure destruction/disposal policy [...]

Continue Reading


08 May 2009 | 10,669 views

Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most [...]

Continue Reading


28 April 2009 | 3,794 views

Industrial Control Systems Safe? I Think Not

It seems like there is some serious hacking going on, attacks on power stations and industrial control systems. You’d think most of these systems would be offline, or at least behind a solid DMZ. But as we’ve seen before they often get exposed by people plugging into the LAN then accessing the net through dial-up [...]

Continue Reading


22 April 2009 | 6,559 views

EFIPW – Modify Apple EFI Firmware Passwords

EFIPW is a tool that can be used to decode and modify Apple EFI firmware passwords via the command line. It is designed after the non open source OFPW utility and is designed to work on Intel machines running Leopard or newer. Useful for lab deployments (setting the firmware password of machines as a post [...]

Continue Reading


25 February 2009 | 7,359 views

Hackers Targeting Xbox Live Players with DoS Attacks

Well the day has come when money-minded botnet owners have turned their services towards online gaming. For a small fee (USD20) you can get someone to set you up with the software to ‘boot’ people from the Xbox Live network. It’s always been a problem in gaming, if something can get hold of your IP [...]

Continue Reading


19 February 2009 | 25,334 views

Satellite Feed Hacking – Your Data Isn’t Private!

Hardware hacking is an interesting area and something not too many people get into as the soldering irons, capacitors and chipsets seem daunting. I did have a play around with cable boxes and satellite feeds in my earlier years and was surprised to find how insecure they were. Most traffic is transmitted unencrypted, the stuff [...]

Continue Reading