7 Coolest Hacks Of 2011

  /     /     /  
Publicated : 22/11/2024   Category : security


7 Coolest Hacks Of 2011


Evil insulin pumps and laptop batteries, war texting, and a tween hacker captured our imagination -- and our attention.



Some hacks are epic not merely for their significance in IT security, but for their sheer creativity and novelty. Theyre those in-your-face hacks that both entertain and educate, and crack those things we take for granted in our everyday lives.
For the fifth year in a row,
Dark Reading
has compiled an end-of-the-year list of the coolest hacks executed by those imaginative, inquisitive, and resourceful hackers who dare to go the distance to try some of the most unique--and sometimes bizarre--hacks.
Some of this years coolest hacks are downright chilling in that they could mean life or death, like the ones that tampered with the dosage dispensed by popular insulin pumps, or that remotely shut down the power on industrial control systems that run power plants. Others were both charming and precocious, like the 10-year-old hacker who found a major flaw in her favorite mobile gaming app after getting bored and looking for a way to progress further with it.
So grab a cup of eggnog, kick back by the fireplace, and time-travel back--to some of the coolest hacks of the year.
1. Remotely starting a car via text message.
Theres war driving, and then theres war texting. Security researcher Don Bailey discovered how simple it is to remotely disarm a car alarm system and control other GSM and cell-connected devices: He showed off his find by remotely starting a car outside Caesars Palace in Las Vegas during the Black Hat USA and DefCon shows.
It took Bailey, a security consultant with iSec Partners, only two hours to first hack into a popular car-alarm system and then start the car from afar with a text message. He and fellow researcher Mat Solnick later re-enacted the hack via video in Vegas.
Read the rest of this article on
Dark Reading
.
Heightened concern that users could inadvertently expose or leak--or purposely steal--an organizations sensitive data has spurred debate over the proper technology and training to protect the crown jewels.
An Insider Threat Reality Check
, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
7 Coolest Hacks Of 2011