Top 5 scary hacks from the Black Hat USA 2016
http://www.ibtimes.co.uk/top-5-scary-hacks-that-emerged-black-hat-usa-hacker-conference-1574677 Hackers can hack every gadget and spy! →
http://www.ibtimes.co.uk/top-5-scary-hacks-that-emerged-black-hat-usa-hacker-conference-1574677 Hackers can hack every gadget and spy! →
http://arstechnica.com/security/2016/08/linux-bug-leaves-usa-today-other-top-sites-vulnerable-to-serious-hijacking-attacks/ There is a serious problem in new TCP feature designed to prevent hacking: it makes possible to make easily man-in-the-middle type attacks from anywhere. Feature is built into Linux kernel 3.6-4.7 (patch on newest version available). https://www.rt.com/usa/355558-linux-vulnerability-websites-attacks/ At the symposium, the researchers demonstrated the exploit by injecting code into a live USA Today page →
Android vulnerability QuadRooter attracted attention at DefCon24 event. QuadRooter was marketed as New Android Vulnerabilities in Over 900 Million Devices. Security company Check Point made lots of noise about it, including releasing an Adroid app to check your phone against this security flaw. QuadRooter is a set of four vulnerabilities affecting Android devices built using →
https://www.linkedin.com/pulse/how-become-hacker-steps-step-pro-mr-ooppss?trk=hp-feed-article-title-share This article has a good list of steps to become good hacker. →
http://thehackernews.com/2016/08/hacking-chip-pin-card.html?m=1 It seems that EVM chip-and-pin cards can be hacked too easily to steal money. →
https://www.linkedin.com/pulse/understanding-ssl-usage-country-john-matherly?trk=hp-feed-article-title-like Nice report on SSL usage situation in real world. →
http://motherboard.vice.com/read/hacking-infrastructure-unknown-risks?trk_source=recommended Hacking critical infrastructure can have disasterous consequences. →
http://motherboard.vice.com/read/how-drones-could-help-hackers-shut-down-power-plants A drone loaded with jamming and hacking equipment can be dangerous to control systems. →
http://thehackernews.com/2016/08/http2-protocol-security.html?m=1 Some HTTP 1.x issues re-introduced and some new. Should you use web application firewall? →
https://www.linkedin.com/pulse/why-trusted-interfaces-should-mandatory-critical-sergiu?trk=hp-feed-article-title-like Check out this article to understand Network of Things security. →