Archive | Hardware Hacking

Advertisements


23 August 2007 | 16,742 views

Caller ID Spoofing to be Made Illegal in the USA

The US Congress recently approved a bill that will make it illegal to spoof Caller ID in the USA. A while back the FCC announced the wanted to crack down on Caller ID spoofing as it was still too easy. The amount of the forfeiture penalty (…) shall not exceed $10,000 for each violation, or […]

Continue Reading


16 August 2007 | 6,859 views

German Hacker Successfully Clones E-Passports

So the latest news is that the RFID chips in electronically enabled passports are NOT encrypted, which bright spark came up with that idea? Ok so you implement ‘more secure’ RFID passports, and leave all the data in plain text for anyone to tamper with – nice! So what do you think they are gonna […]

Continue Reading


18 July 2007 | 9,640 views

Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt

The scariest type of all, hardware vulnerabilities. Security guru and creator of OpenBSD Theo de Raadt recently announced he had found some fairly serious bugs in the hardware architecture of Intel Core 2 Duo processors. He goes as far as saying avoid buying a C2D processor until these problems are fixed. A prominent software developer […]

Continue Reading


11 April 2007 | 14,507 views

Legal to Unlock Cell Phones Since November 2006

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider. Before that it was illegal to unlock your phone but finally in November 2006 it came out in court […]

Continue Reading


29 January 2007 | 15,899 views

Hacking your $60 Router into a $600 Router

This is a bit of hacking in the original sense of the word, taking a $60 router and giving it the capabilities of something costing in the hundreds or thousands (enterprise level). Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular […]

Continue Reading


13 September 2006 | 19,578 views

Using the capture command in a Cisco Systems PIX firewall.

This is an excellent article you might find useful covering the use of the capture command in Cisco PIX firewalls. A vital tool to use when troubleshooting computer networking problems and monitoring computer networks is a packet sniffer. That being said, one of the best methods to use when troubleshooting connection problems or monitoring suspicious […]

Continue Reading


23 August 2006 | 4,679 views

libtiff Vulnerability gives hope for a new GTA-less PSP exploit

QJ.net forums have been abuzz lately with the talk of a possible new exploit centered around a libtiff vulnerability. NOPx86 stating that he’d managed to crash the PSP using this method. As those of you who follow these things know, a crash doesn’t always mean an open door to an exploit. But after a cumulative […]

Continue Reading


05 July 2006 | 3,438 views

Veterans Administration Chief Says Laptop Recovered

Ah, so finally they got it back, from a street corner of all places. Let’s hope they shall be a little more careful in the future yah? The missing laptop and hard drive that contained veterans’ personal information has been found, Veterans Administration Chief Jim Nicholson announced Thursday. The announcement came at the beginning of […]

Continue Reading


26 June 2006 | 5,083 views

US Veterans Information Leaked on The Web

Another HUGE information leak from the US government, seems they can’t help themselves. Or perhaps people are just ramping up the efforts against them.. The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website. The Navy said Friday […]

Continue Reading


23 June 2006 | 13,250 views

Researchers hack Wi-Fi driver to breach laptop

Ah another way to exploit wifi, what a surprise! Security researchers have found a way to seize control of a laptop computer by manipulating buggy code in the system’s wireless device driver. The hack will be demonstrated at the upcoming Black Hat USA 2006 conference during a presentation by David Maynor, a research engineer with […]

Continue Reading


Advertisements