Search
Items tagged with: hacking
StratoSoar Glider Flies Itself from High Altitude
As the technology available to the average hacker and maker gets better and cheaper each year, projects which at one time might have only been within the reach of government …read more
#hacking #projects
https://hackaday.com/2024/09/23/stratosoar-glider-flies-itself-from-high-altitude/
StratoSoar Glider Flies Itself From High Altitude
As the technology available to the average hacker and maker gets better and cheaper each year, projects which at one time might have only been within the reach of government agencies are inching cl…Hackaday
Mechanical Logic Gates With Amplification
One of the hardest things about studying electricity, and by extension electronics, is that you generally can’t touch or see anything directly, and if you can you’re generally having a …read more
#hacking #projects
https://hackaday.com/2024/09/20/mechanical-logic-gates-with-amplification/
Solingen: Polizei soll Gesichts- und Stimmerkennung im Netz durchführen
Der Regierungsentwurf für die Ampel zur Terrorismusbekämpfung aus dem "Sicherheitspaket" geht weiter als angekündigt und schließt einen Stimmenvergleich ein.Stefan Krempl (heise online)
The Trashiest Of Mains Inverters
Switch-mode technology has made inverters which take a low DC voltage and turn it into a usable mains voltage within the reach of everybody. But still, there might be moments …read more
#hacking #projects
https://hackaday.com/2024/08/31/the-trashiest-of-mains-inverters/
The Trashiest Of Mains Inverters
Switch-mode technology has made inverters which take a low DC voltage and turn it into a usable mains voltage within the reach of everybody. But still, there might be moments when a mains supply is…Hackaday
Timeline of SIM Card Registration Laws
IMAGE SOURCE: "My Phone Bought This" by oliver t is licensed underPrivacy International
MIDI Controller in a Cubic Inch
MIDI as a standard has opened up a huge world to any musician willing to use a computer to generate or enhance their playing and recording. Since the 80s, it …read more
#hacking #projects
https://hackaday.com/2024/07/27/midi-controller-in-a-cubic-inch/
MIDI Controller In A Cubic Inch
MIDI as a standard has opened up a huge world to any musician willing to use a computer to generate or enhance their playing and recording. Since the 80s, it has it has revolutionized the way music…Hackaday
Reverse-Engineering a Shahed-136 Drone Air Data Computer
An air data computer (ADC) is a crucial part of an avionics package that can calculate the altitude, vertical speed, air speed and more from pressure (via pitot tubes) and …read more
#hacking #projects
https://hackaday.com/2024/07/15/reverse-engineering-a-shahed-136-drone-air-data-computer/
Reverse-Engineering A Shahed-136 Drone Air Data Computer
An air data computer (ADC) is a crucial part of an avionics package that can calculate the altitude, vertical speed, air speed and more from pressure (via pitot tubes) and temperature inputs. When …Hackaday
Human-Interfacing Devices: HID over I2C
#hackadaycolumns #peripheralshacks #reverseengineering #device #hacking #hid #i2c #peripheral #hackaday
posted by pod_feeder_v2
Human-Interfacing Devices: HID Over I2C
In the previous two HID articles, we talked about stealing HID descriptors, learned about a number of cool tools you can use for HID hacking on Linux, and created a touchscreen device. This time, l…Hackaday
A couple things to think about here:
This appears to be a malicious maintainer - not a compromised account. Meaning the person themselves, coded this in an pushed it out.
So:
1) Did they try and backdoor any other code?
2) Are they part of a greater campaign or is anyone else helping them.
This is a massive breach of trust.
That said! Huge kudos to Andres Freund, Florian Weimer, and others in finding this.
A lot of eyes are on this now. CISA is involved. Major distros are involved, etc. Many eyes and such.
Urgent security alert for Fedora Linux 40 and Fedora Rawhide users
Red Hat Information Risk and Security and Red Hat Product Security learned that the latest versions of the “xz” tools and libraries contain malicious code that appears to be intended to allow unauthorized access., (Red Hat)
There’s Hope For That Cheap Lathe Yet!
There may be few cases where the maxim that “you get what you pay for” rings true, than a lathe. The less you spend on a lathe, the closer you …read more
#hacking #projects
https://hackaday.com/2024/02/25/theres-hope-for-that-cheap-lathe-yet/
There’s Hope For That Cheap Lathe Yet!
There may be few cases where the maxim that “you get what you pay for” rings true, than a lathe. The less you spend on a lathe, the closer you get to a lathe-shaped object and the furth…Hackaday
Hacking a Philips toothbrush head to allow you to use it beyond its normal lifetime. Yes, the toothbrush _head_ is hackable. This is a fantastic tale of reverse engineering. Be sure to read the followup at the bottom of the article.
https://kuenzi.dev/toothbrush/
#hacking #reverseengineering #sdr
Hacking my “smart” toothbrush
After buying a new Philips Sonicare toothbrush I was surprised to see that it reacts to the insertion of a brush head by blinking an LED.ckuenzi (The Twenty Percent)
Territories across the northern hemisphere are suffering through record-breaking heatwaves this summer. Climate scientists are publishing graphs with red lines jagging dangerously upwards as unprecedented numbers pour in. Residents of …read more
#hacking #projects
https://hackaday.com/2023/07/27/how-to-survive-a-wet-bulb-event/
How To Survive A Wet Bulb Event
Territories across the northern hemisphere are suffering through record-breaking heatwaves this summer. Climate scientists are publishing graphs with red lines jagging dangerously upwards as unprec…Hackaday
[Jeff Geerling] has tried building his own network-attached storage before, but found that the Raspberry Pi just wasn’t able to keep pace with his demands. He’s back with a new …read more
#hacking #projects
https://hackaday.com/2023/07/20/diy-all-flash-nas-vs-commercial-hardware/
DIY All-Flash NAS Vs. Commercial Hardware
[Jeff Geerling] has tried building his own network-attached storage before, but found that the Raspberry Pi just wasn’t able to keep pace with his demands. He’s back with a new all-flas…Hackaday
The hacker also stole an encryption key for a portion of the encrypted backups by accessing a cloud storage database shared by both LastPass and GoTo.
#news #tech #technology #security #privacy #Lastpass #breach #hacking
https://www.pcmag.com/news/lastpass-sibling-company-goto-loses-encrypted-backups-to-hackers
https://www.techdirt.com/2022/12/05/law-enforcement-is-extracting-tons-of-data-from-vehicle-infotainment-systems/
#infotainment #databrokers #siriusxm #hacking #privacy #cars #1
Law Enforcement Is Extracting Tons Of Data From Vehicle Infotainment Systems
For years, cars have collected massive amounts of data. And for years, this data has been extraordinarily leaky. Manufacturers don’t like to discuss how much data gets phoned home from vehicl…Techdirt
After completing a thorough investigation, we found that he has not been hacked. Unfortunately, that's just how he is.
#Cyber #CyberSecurity #SocialEngineering #hacking