Iran ups cyber attacks on Israeli computers: Netanyahu - Yahoo! News:
2013 will be known as the year where Cyber security became an "aware issue" for most citizens worldwide. This is disruptive warfare and changes the rules of the game of power.
'via Blog this'
Raw research material for a body of work at http://eBomb.us by "Mike" Michael L. Baird mike [at} mikebaird d o t com
Sunday, June 9, 2013
Sunday, June 2, 2013
Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes:
Innocent-looking, malicious USB chargers can be constructed that will infect your iPhone - it's just a matter of time -Cybercrime is just getting started.... http://ebomb.us
'via Blog this'
Innocent-looking, malicious USB chargers can be constructed that will infect your iPhone - it's just a matter of time -Cybercrime is just getting started.... http://ebomb.us
'via Blog this'
Wednesday, March 20, 2013
A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science
A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science:
they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower... the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers... Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.
'via Blog this'
they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower... the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers... Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.
'via Blog this'
Tuesday, March 19, 2013
Hacked PCs falsify billions of ad clicks - FT.com
Hacked PCs falsify billions of ad clicks - FT.com:
Even the wild west analogy barely steps up to the scale and potential financial and economic impact of intrusions on and attacks into the new internet infrastructure where rules and laws are made in real-time by gangsters, warriors, terrorists, entrepreneurs, and state actors, to exploit and capitalize and profit from gaming the system. Attacks in the future will not be conventional bombs, and suicide vests, but rater processes perturbing transactions resulting in chaos in financial systens as confidence evaporates.
Beware eBomb.us
'via Blog this'
Even the wild west analogy barely steps up to the scale and potential financial and economic impact of intrusions on and attacks into the new internet infrastructure where rules and laws are made in real-time by gangsters, warriors, terrorists, entrepreneurs, and state actors, to exploit and capitalize and profit from gaming the system. Attacks in the future will not be conventional bombs, and suicide vests, but rater processes perturbing transactions resulting in chaos in financial systens as confidence evaporates.
Beware eBomb.us
'via Blog this'
Subscribe to:
Posts (Atom)