fajb_vote_machine_hack_02_aug2016

Voting machines under hacker threat

Symantec researchers informed that the voting machines used for the US presidential elections have several vulnerabilities. The card which users are given to cast vote can be used multiple times. The security researcher schneier has earlier suggested that paper based voting is more secure than internet voting. The hackers can delete voting records, can have potential […]

kerberos

How Kerberos works?

Let me try to explain Kerberos today. Kerberos is based on Needham–Schroeder protocol. Kerberos is designed to protect from password sniffing attacks, MITM etc. All the user credentials is stored in a Centralised location. The disadvantage is that, this also leads to single point of failure. In the case of Kerberos, the user sends the Principal […]

ipsec

How IPSEC works?

I could see that, an explanation to IPSEC is not explained well in all the articles I’ve read. I’ll try to explain IPSEC as simple as possible. IPSEC is having two Phases. First is IKE Phase 1. IKE Phase 1: The two end points need to Authenticate first. Authentication can be performed using 3 methods, […]

jack-dorsey

Twitter CEO Jack Dorsey’s account hacked by OurMine!

After a series of celebrity Twitter handle hacks over the past few months, Jack Dorsey, the CEO of Twitter, had his account compromised briefly on Saturday, a media report said. A group by the name of “OurMine” — the same group that claimed credit for compromising Facebook chief Mark Zuckerberg’s and Google CEO Sundar Pichai’s […]

acoustic-waveform

New Malware to exfil data from air gapped computers using fan!

When it comes to computer security, the ultimate protection is the “air gap”—a physical space between a computer and the Internet to ensure that the device is entirely isolated from the dangerous world of hacking. But while air-gapping computers is an effective way to protect them, it is not perfect. In recent years, computer security […]

103537634-GettyImages-492752888.530x298

New Bart Ransomware from the makers of Locky

  The actors behind  Locky have introduced a new ransomware called “Bart”. They are using the RockLoader malware to download Bart over HTTPS. Bart has a payment screen like Locky but encrypts files without first connecting to a command and control (C&C) server. Researchers detected a large campaign with .zip attachments containing JavaScript code. If opened, […]

m2-642x336

Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs

Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK security firm Pen Test Partners has demonstrated that it is possible to remotely control some feature of the popular SUV Mitsubishi Outlander plug-in hybrid electric vehicle […]