Tag - hacking

Hacking Wheelchairs over Bluetooth
Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory. > CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth > connections, allowing an attacker who is in Bluetooth range of the targeted > device to pair with it. The attacker could then control the wheelchair’s > movements, override speed restrictions, and manipulate configuration profiles, > all without requiring credentials or user interaction.
Uncategorized
hacking
Internet of Things
Bluetooth
transportation
1980s Hacker Manifesto
Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack. > You bet your ass we’re all alike… we’ve been spoon-fed baby food at school > when we hungered for steak… the bits of meat that you did let slip through > were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by > the apathetic. The few that had something to teach found us willing pupils, > but those few are like drops of water in the desert. > > This is our world now… the world of the electron and the switch, the beauty of > the baud. We make use of a service already existing without paying for what > could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us > criminals. We explore… and you call us criminals. We seek after knowledge… and > you call us criminals. We exist without skin color, without nationality, > without religious bias… and you call us criminals. You build atomic bombs, you > wage wars, you murder, cheat, and lie to us and try to make us believe it’s > for our own good, yet we’re the criminals...
Uncategorized
hacking
history of security
Denmark Accuses Russia of Conducting Two Cyberattacks
News: > The Danish Defence Intelligence Service (DDIS) announced on Thursday that > Moscow was behind a cyber-attack on a Danish water utility in 2024 and a > series of distributed denial-of-service (DDoS) attacks on Danish websites in > the lead-up to the municipal and regional council elections in November. > > The first, it said, was carried out by the pro-Russian group known as > Z-Pentest and the second by NoName057(16), which has links to the Russian > state. Slashdot thread.
Russia
Uncategorized
hacking
cyberattack
infrastructure
AI Advertising Company Hacked
At least some of this is coming to light: > Doublespeed, a startup backed by Andreessen Horowitz (a16z) that uses a phone > farm to manage at least hundreds of AI-generated social media accounts and > promote products has been hacked. The hack reveals what products the > AI-generated accounts are promoting, often without the required disclosure > that these are advertisements, and allowed the hacker to take control of more > than 1,000 smartphones that power the company. > > The hacker, who asked for anonymity because he feared retaliation from the > company, said he reported the vulnerability to Doublespeed on October 31. At > the time of writing, the hacker said he still has access to the company’s > backend, including the phone farm itself. ...
AI
Uncategorized
hacking
marketing
phones
Rigged Poker Games
The Department of Justice has indicted thirty-one people over the high-tech rigging of high-stakes poker games. > In a typical legitimate poker game, a dealer uses a shuffling machine to > shuffle the cards randomly before dealing them to all the players in a > particular order. As set forth in the indictment, the rigged games used > altered shuffling machines that contained hidden technology allowing the > machines to read all the cards in the deck. Because the cards were always > dealt in a particular order to the players at the table, the machines could > determine which player would have the winning hand. This information was > transmitted to an off-site member of the conspiracy, who then transmitted that > information via cellphone back to a member of the conspiracy who was playing > at the table, referred to as the “Quarterback” or “Driver.” The Quarterback > then secretly signaled this information (usually by prearranged signals like > touching certain chips or other items on the table) to other co-conspirators > playing at the table, who were also participants in the scheme. Collectively, > the Quarterback and other players in on the scheme (i.e., the cheating team) > used this information to win poker games against unwitting victims, who > sometimes lost tens or hundreds of thousands of dollars at a time. The > defendants used other cheating technology as well, such as a chip tray > analyzer (essentially, a poker chip tray that also secretly read all cards > using hidden cameras), an x-ray table that could read cards face down on the > table, and special contact lenses or eyeglasses that could read pre-marked > cards. ...
Uncategorized
hacking
cheating
gambling
AI Summarization Optimization
These days, the most important meeting attendee isn’t a person: It’s the AI notetaker. This system assigns action items and determines the importance of what is said. If it becomes necessary to revisit the facts of the meeting, its summary is treated as impartial evidence. But clever meeting attendees can manipulate this system’s record by speaking more to what the underlying AI weights for summarization and importance than to their colleagues. As a result, you can expect some meeting attendees to use language more likely to be captured in summaries, timing their interventions strategically, repeating key points, and employing formulaic phrasing that AI models are more likely to pick up on. Welcome to the world of AI summarization optimization (AISO)...
AI
Uncategorized
LLM
hacking
Autonomous AI Hacking and the Future of Cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything. Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...
AI
Uncategorized
LLM
hacking
vulnerabilities