Select date

October 2024
Mon Tue Wed Thu Fri Sat Sun

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards & more

16-8-2024 < Attack the System 24 303 words
 
Science and Technology


How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards


Andy Greenberg


A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.


READ



Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look


Lily Hay Newman


On the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more.


READ



ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look


Lily Hay Newman


Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.”


READ



Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App


Lily Hay Newman


A fix is coming, but data analytics giant Palantir says it’s ditching Android devices altogether because Google’s response to the vulnerability has been troubling.


READ



‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections


Andy Greenberg


Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.


READ



Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All


Matt Burgess


Security researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources.


READ








View our Privacy Policy




Print