The Hacker News Logo
Subscribe to Newsletter

The Hacker News — Cyber Security and Hacking News Website: video

Hackers Demonstrate Car Hacking using a laptop

Hackers Demonstrate Car Hacking using a laptop

July 27, 2013Mohit Kumar
Computer geeks already knew it was possible to hack into a car's computerized systems and finally, two U.S. hackers - Charlie Miller and Chris Valasek, sponsored by the Pentagon's research facility DARPA recently demonstrated just how easy it is for malicious hackers to physically hijack a modern car using a laptop. Feeling exiting ... ? You should worry too..It's all very concerning. Because you may never drive your car again after you see how a couple of government funded tech guys were able to hack into, and take control of car’s steering, dashboard, and even its brakes. Forget hacking accounts, computers or mobile devices, this new threat to our vehicles is thanks to the evolution of electronic control units being installed in most new cars. Charlie Miller , a security engineer at Twitter, and Chris Valasek, the Director of Security Intelligence at IOActive received an $80,000 grant from the US government in order to research these new vulnerabilities .
Edward Snowden made public appearance at Moscow's Sheremetyevo Airport

Edward Snowden made public appearance at Moscow's Sheremetyevo Airport

July 13, 2013Mohit Kumar
Whistleblower Edward Snowden made a public appearance yesterday at a Moscow airport, beside a staff member of the Wikileaks organization, met with representatives of a half-dozen or so human rights groups. Snowden has not been seen in public and was stuck in the transit area of Moscow’s Sheremetyevo Airport since arriving there on June 23 from Hong Kong . A 30 second video posted on youtube, which did not name the source for this clip. Notable because no press were permitted inside, and no video was allowed. Snowden said that he wants asylum in Russia before moving on to Latin America and assailing U.S. surveillance programs as illegal and immoral, but Immigration officials in Russia say they've not received any application from Edward Snowden . As Snowden explained it Friday, he disputes the notion that his actions are doing damage to the United States. As a result, Putin's condition doesn't apply. Snowden said that he has received offers of asylum
Anonymous Hacker outs wanted Edmonton men for child exploitation

Anonymous Hacker outs wanted Edmonton men for child exploitation

June 11, 2013Mohit Kumar
A YouTube video posted by a group calling themselves Anonymous is getting a lot of attention online, claims to have outed two men who allegedly tried to lure underaged girls over the internet. In a video posted on Friday, a member of Anonymous describes a sting operation in which two Edmonton-area men were allegedly caught trying to meet up with 13- and 14-year-old girls for sex. Bob Andrews, the head of ALERT’s Integrated Child Exploitation unit in Edmonton. “I think it’s really important to let the police do their jobs, and not judge someone in a public forum. ” Hacker also claims that they contacted Edmonton police about one meeting that was supposed to take place at West Edmonton Mall, but that police did nothing. “ There has been no reply. This is unacceptable. Together, we must act, and we must act swiftly to protect our children. For your benefit, we will begin to reveal the identities of the people that were identified ,” the video states. The video detai
Defence develop Software that can track people on Social media

Defence develop Software that can track people on Social media

February 12, 2013Mohit Kumar
A multinational security firm ' Raytheon ' has secretly developed software called ' RIOT ', capable of tracking people's movements and predicting future Behavior by mining data from social networking websites. The multi billion dollar company, didn't want its concept video revealed, but the Guardian posted it anyway. Raytheon has not yet sold RIOT to any clients but has been shared with the US government as part of a joint research project to develop a Big Data system capable of surveilling large parts of the population. The software can also pull metadata from pictures taken to pinpoint a user’s location when the picture was taken. From this and other location data taken from applications i.e Foursquare, the software can predict future movements of users. The video shows how Riot works on a sample Raytheon staff member, tracking his regular visits to Washington Nationals Park and a local gym. RIOT creates unique profiles from publicly available data, inclu
Remote 0day Exploit for Tectia SSH Server released

Remote 0day Exploit for Tectia SSH Server released

December 03, 2012Mohit Kumar
Hacker @kingcope discovered critical vulnerability in Tectia SSH Server. Exploit working on SSH-2.0-6.1.9.95 SSH Tectia Server (Latest available version from www.tectia.com) that allow attacker to bypass Authentication remotely. Description :  An attacker in the possession of a valid username of an SSH Tectia installation running on UNIX (verified on AIX/Linux) can login without a password. The bug is in the “SSH USERAUTH CHANGE REQUEST” routines which are there to allow a user to change their password. A bug in the code allows an attacker to login without a password by forcing a password change request prior to authentication. Download Exploit Code : Click Here A default installation on Linux (version 6.1.9.95 of Tectia) is vulnerable to the attack. Eric Romang posted a Demo video on Youtube, hope you will like it :) Command Source : http://goo.gl/BHqWd
Exclusive Deals

Get Daily News Updates By Email

Join over 350,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.