Posted by david b. on December 5, 2013
In this section of the presentation, beist compares Smart TV and smartphones in terms of compromising and focuses on actual TV surveillance on the code level.
Before we move on to how I implemented surveillance...
Posted by david b. on December 3, 2013
Moving on with his Black Hat talk, SeungJin Lee describes the discovered security weaknesses of Smart TV technology which can be used for deploying attacks.
I’m going to show three vulnerabilities in the app store....
Posted by david b. on November 28, 2013
Having outlined the key features of Smart TV technology, SeungJin Lee is now focusing on reverse-engineering its exploitable components for the attack purpose.
I’m going to talk about the Smart TV attack vectors (see...
Posted by david b. on November 26, 2013
Special guest at the Black Hat USA event SeungJin Lee, aka beist, from the Korea University highlights the main vectors for exploiting Smart TV technology.
I’m going to talk about Smart TV hacking. Let me introduce...
Posted by david b. on November 24, 2013
Gordon Corera makes a judicious point here that the undoubted benefits from using computers and the downside of our increasing vulnerability go hand in hand.
Over at the State Department in the office of Chris Painter,...
Posted by david b. on November 22, 2013
BBC reporter’s focus in this entry lies in the realm of the infamous cyber attack on Estonia in 2007 and facts behind Stuxnet as viewed by renowned experts.
The first signs that one state might be prepared to use the...
Posted by david b. on November 21, 2013
Gordon Corera and his interviewees dwell in this part of the series on cyber attacks targeting components of critical infrastructure, and their consequences.
Everyone says they’re under attack in cyberspace. But they...
Posted by David Balaban on November 20, 2013
Without exaggeration, CCleaner is an excellent system optimization tool.
Usability: Features: Efficiency: Support: Overall:
Maintaining a healthy computer is not...