Category Archives: security

Blacksmith Elevates the Craft with this Fabulous Strongbox

For most of human industrial history, the blacksmith was the indispensable artisan. He could fashion almost anything needed, from a simple hand tool to a mechanism as complex as a rifle. Starting with the most basic materials, a hot forge, and a few tools that he invariably made himself, the blacksmith was a marvel of fabrication.

If you have any doubt how refined the blacksmith’s craft can be, feast your eyes on [Seth Gould]’s masterpiece of metalwork. Simply called “Coffer”, [Seth] spent two years crafting the strongbox from iron, steel, and brass. The beautifully filmed video below shows snippets of …read more

Continue reading

Posted in blacksmith, brass, classic hacks, iron, latch, locksmith, metalwork, security, spring, steel | Leave a comment

UPnP, Vulnerability As A Feature That Just Won’t Die

UPnP — in a perfect world it would have been the answer to many connectivity headaches as we add more devices to our home networks. But in practice it the cause of a lot of headaches when it comes to keeping those networks secure.

It’s likely that many Hackaday readers provide some form of technical support to relatives or friends. We’ll help sort out Mom’s desktop and email gripes, and we’ll set up her new router and lock it down as best we can to minimise the chance of the bad guys causing her problems. Probably one of the first …read more

Continue reading

Posted in chromecast, Current Events, Featured, news, PewDiePie, routers, security, security hacks, T-series, upnp, youtube | Leave a comment

E-Mail Service Claims it Doesn’t Store Your Mail

There have been many news stories lately about companies misusing your data, including your e-mails. What’s more, these giant repositories of data are favorite targets for hackers. Even if you trust the big corporations, you are also betting on their security. Criptext claims they have (possibly) the most private e-mail service ever. It uses the open Signal protocol and stores private keys and encrypted mail only on your device. All the applications to access your mail are open source, so presumably, someone would eventually spot any backdoors or open holes.

At the moment the service is free and the company …read more

Continue reading

Posted in cybersecurity, email, encryption, InfoSec, security, security hacks | Leave a comment

Hacker Pops Top On NFC Vending Machines

Vending machines used to be a pretty simple affair: you put some coins in, and food or drink that in all likelihood isn’t fit for human consumption comes out. But like everything else today, they are becoming increasingly complex Internet connected devices. Forget fishing around for pocket change; the Coke machine at the mall more often than not has a credit card terminal and a 30 inch touch screen display to better facilitate dispensing cans of chilled sugar water. Of course, increased complexity almost always goes hand in hand with increased vulnerability.

So when [Matteo Pisani] recently came across a …read more

Continue reading

Posted in Cellphone Hacks, database, disclosure, NFC, root, security, security hacks, vending machine | Leave a comment

Foreshadow: The Sky Is Falling Again for Intel Chips

It’s been at least a month or two since the last vulnerability in Intel CPUs was released, but this time it’s serious. Foreshadow is the latest speculative execution attack that allows balaclava-wearing hackers to steal your sensitive information. You know it’s a real 0-day because it already has a domain, a logo, and this time, there’s a video explaining in simple terms anyone can understand why the sky is falling. The video uses ukuleles in the sound track, meaning it’s very well produced.

The Foreshadow attack relies on Intel’s Software Guard Extension (SGX) instructions that allow user code to allocate …read more

Continue reading

Posted in cpu, foreshadow, intel, intel CPU, Meltdown, news, security, security hacks, Spectre | Leave a comment

Linux Fu: Counter Rotate Keys!

If you’ve done anything with a modern Linux system — including most variants for the Raspberry Pi — you probably know about sudo. This typically allows an authorized user to elevate themselves to superuser status to do things.

However, there is a problem. If you have sudo access, you can do anything — at least, anything the sudoers file allows you to do. But what about extremely critical operations? We’ve all seen the movies where launching the nuclear missile requires two keys counter-rotated at the same time and third firing key. Is there an equivalent for Linux systems?

It isn’t …read more

Continue reading

Posted in Linux Fu, linux hacks, pair, security, sudo | Leave a comment

A Home Network, Security System, And A Hidden Room Behind A Bookcase

Ok, now this is something special. This is a home network and security system that would make just about anyone stop, and with jaw hanging agape, stare, impressed at the “several months of effort” it took [timekillerjay] to install their dream setup. Just. Wow.

Want a brief rundown of the diverse skill set needed to pull this off? Networking, home security, home automation, woodworking, running two thousand feet(!) of cat 6a cable, a fair hand at drywall work for the dozens upon dozens of patches, painting, staining, and — while not a skill, but is definitely necessary — an amazingly …read more

Continue reading

Posted in home, home hacks, magnetic lock, Network Hacks, Raspberry Pi, security, security hacks, ups, woodworking | Leave a comment

Cracking A Bluetooth Credit Card

You might be surprised to find out that it’s actually not a good idea to put all of your credit card information on a little Bluetooth enabled device in your pocket. Oh, what’s that? You knew already? Well in that case you won’t find the following information terribly shocking, but it’s still a fascinating look at how security researchers systematically break down a device in an effort to find the chinks in its armor.

[Mike Ryan] of ICE9 Consulting has recently published an article detailing the work done to examine and ultimately defeat the security on the FUZE Card. From …read more

Continue reading

Posted in reverse engineer, security, security hacks, wearable hacks | Leave a comment

Monitor Foot Traffic Using Radio

We talk a lot about information security around here, but in reality it’s not at the forefront of everyone’s minds. Most people are content to walk around with their phones constantly looking for WiFi or Bluetooth connections despite the dangers. But if you’re not a black hat sort of person, you can do something like [Verkehrsrot] did and use all of these phones to do something useful and harmless.

[Verkehrsrot]’s project involves building a radio listening device in order to get an estimate of the amount of traffic in a particular area. The device polls for and detects WiFi and …read more

Continue reading

Posted in listening, radio, security, traffic, wifi, wireless hacks | Leave a comment