Always Providing You With Ongoing Information

Posts tagged ‘Hacking’

Keycode Grabbers & Stealing Cars

Snapshotfishnet7

Key code grabbers can make stealing some late-model cars shockingly easy. New and late-model cars are equipped with keyless entry and keyless start. These popular features let motorists unlock their car and start it without taking their key fob out of their pocket. The fob communicates with the car by emitting a code that’s picked up by an antenna normally hidden under one of the body panels. Thieves have found a way around it using a device called a grabber that’s readily available online. Amazon sells them cheap.

The grabber receives and records the code emitted by the fob. It then transfers it to a booster, which in turn uses it to trick the car into thinking the key fob is near. Armed with this technology, thieves can enter your car without needing to break a window or bend a door, and they’re often able to start the engine. The grabber must be positioned relatively close to the key fob to catch its code. It won’t work if the thief is a block away from where you park.

Several cars were tested that are popular in the United Kingdom, though not all of them are sold in the United States. The worst performer is the DS 3 Crossback, a premium crossover made by Paris-based Peugeot. It took security experts five seconds to break into the car, and another five seconds to drive off in it. The Land Rover Discovery Sport was gone in 30 seconds. The standard Discovery was broken into in 20 seconds, but driving off in it was impossible.

The BMW X3 and the Ford Fiesta stood out as the best models tested by the magazine. Its security experts needed 40 seconds to get in, and another 20 seconds to start the engine. Best is a relative term here; the study suggests stealing a $41,000 SUV takes approximately one minute.

Automakers are turning to technology to fight high-tech car thefts. Some brands — including BMW and Mercedes-Benz — use motion detection sensors to turn the fob off when it’s not being used, like when it’s on your kitchen table. Not every company offers this feature, however. If you’re not sure whether your car has it, and if you think it’s at risk of getting stolen, they suggest keeping your key fob away from doors and windows to reduce the odds of someone interception the code it emits.

Is Your Banking Hacking Your Transactions?

Snapshot41_157

READ MORE HERE

MORE HERE

READ MORE

Monroe College Hacked. They Demanded 2 Million In Bitcoin

Snapshot41_139

A cyber attack halted many of Monroe College’s technology systems and platforms last week. Students and faculty and staff members were locked out of the college’s website, learning management system and email, with hackers demanding payment of around $2 million in Bitcoin to restore access.

Marc Jerome, president of Monroe College, a for-profit institution in New York City, confirmed the cyber attack in a statement July 11. “Our team is working feverishly to bring everything back online, and we are working with the appropriate authorities to resolve the situation as quickly as possible,” he said.

“In the meantime, Monroe continues to operate,” said Jerome. “We’re simply doing it the way colleges did before email and the internet, which results in more personal interactions. As we have done throughout our 86-year history, we are coming together to assure that our students, faculty and staff are well served.”

The college is working with local law enforcement officials and the Federal Bureau of Investigation. There was no comment on whether the college plans to pay the $2 million ransom.

Despite the college’s learning management system, Blackboard, going down, students continued to attend classes last week, handing in homework on paper.

Image

HACKING

Hacker Motives: Red Flags and Prevention - infographic

Nike’s Self Tying Sneakers Works With An App So Could They Be Hacked?

Nike Adapt BB Black Pure Platinum

Nike’s Adapt BBs aren’t even the first pair of smart shoes. Under Armour has been making connected kicks for a while now — it’s on its fourth generation with its HOVR line, with an embedded chip that tracks your footsteps and running pace. Puma also entered the self-tying shoe world with the Puma Fit Intelligence line, which it announced Jan. 31.

Nike and Under Armour say they’re taking data privacy and security seriously with their new shoes. Puma, which is expecting its self-tying sneakers release in 2020, didn’t offer details on its shoe security protocol.

While Nike says it’s kept its connected sneakers safe from hackers, the concern is that as more companies try to make connected shoes, the chances of having a shoe eventually hacked will increase.

The Adapt BBs pair with Nike’s app through Bluetooth Low Energy, a connection protocol that’s often used in smart devices because it allows for longer battery life. The sneaker connection is encrypted, a Nike spokesman said.

However, Bluetooth Low Energy isn’t impervious. Security researchers have found issues with BLE chips that could have allowed hackers to spread malware across hospitals and factories.

sp19-bb-nike-adapt-shoe-screen-vert-01012019-re-native-1600

Nike’s app will do more than just control the laces on your sneakers. The company wants to collect data through the app to help athletes with their performance

img-2478

Inside the shoebox for Under Armour’s new line of HOVR sneakers, which have a chip inside that tracks your steps and running activity.

 

Now They’re Hacking Hot Tubs

 

Related image

Thousands of hot tubs can be hacked and controlled remotely because of a hole in their online security, BBC Click has revealed.

 

Read Here

Pentagon Hacked Too!

Snapshot24_002

Defense Travel System Hacked, Employee Credit Card Info Stolen

The hack of the DoD’s automated booking and travel site, the travel records and credit card information of as many as 30,000 military members and government civilian employees were stolen. Every service member must use the Defense Travel System to book official travel to schools, conferences, and other training away from their home station. This latest one appears to be the fault of a contractor, who at this time remains unnamed. The results could be wide-reaching though, as both military and civilian workers were affected.

It appears that hacking has become easy.

Last year, the hackers at DEF CON showed how easy it was to crack into voting machine software and hardware.

August 10, teams in three age ranges, 8-11, 12-14 and 15-16, let loose on replica American government websites that report election results. In elections in the Ukraine and Ghana, these were hacked to spread confusion about the voting process and its results – and the village’s organizers hope the youngsters can do the same with US-style tech. They even had some five year olds hacking

More Here

Tag Cloud

%d bloggers like this: