Posted on Tuesday, October 6th, 2015 by Ken Munro.
A few months ago I was approached by a researcher for CSI Cyber. Yes, the US TV show that fictionalises and stretches the bounds of genuine hacking somewhat. They had seen our research into My Friend Cayla and wanted to include a talking kids doll in an episode. I thought long and hard about this; […] Read More
Posted on Friday, October 2nd, 2015 by David Lodge.
Here’s part 2 to an article I originally wrote in April (speedy heh?) about hacking a cheap and nasty IP camera I’d bought from Aldi. I’d essentially had a quick look at the device, then went on to delve into the firmware and extract the default credentials. Not much exciting other than highlighting why unencrypted […] Read More
Posted on Friday, September 25th, 2015 by Pedro Venda.
Microsoft’s Safety & Security Center [sic] is loaded with cracking advice. They have nice section on phishing emails. It gives some pointers on what a likely phishing email contains, so you can decide whether or not to act on it, and how to go about reporting it. I got an email recently which stank of […] Read More
<< Older posts