Air Force to offer up a satellite to hackers at Defcon 2020

Credit to Author: Lisa Vaas| Date: Thu, 19 Sep 2019 14:42:48 +0000

This year, the Air Force presented vetted hackers with a plane’s subsystem, which they duly tore up. Next year, it will be a satellite.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wh-pZprliQk” height=”1″ width=”1″ alt=””/>

Read more

Using smart sensor technology in building design

In today's world, spaces with motion and temperature 'smart sensors' are common and generally improve our overall well-being. However, research indicated that while the information and technology exists to assist architects in designing structures that offer more efficient space and energy management, they seldom take advantage of those available resources.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Credit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Read more

Capital One cryptojacking suspect indicted

Credit to Author: Lisa Vaas| Date: Mon, 02 Sep 2019 10:39:21 +0000

The former software engineer allegedly created scanners to look for misconfigured servers rented from a cloud computing company.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/au_7MSrus80″ height=”1″ width=”1″ alt=””/>

Read more

The Silence hacking crew grows louder

Credit to Author: Danny Bradbury| Date: Thu, 22 Aug 2019 10:32:26 +0000

The hacking group, which specialises in stealing from banks, has been spreading its coverage and becoming more sophisticated.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/harEaJXHeBo” height=”1″ width=”1″ alt=””/>

Read more