When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits like the ones that hackers used to remotely take over a Chevrolet Impala in 2010 or a Jeep in 2015 took years of work …
Read More »Some Mad Genius Put ChatGPT on a TI-84 Graphing Calculator
On Saturday, a YouTube creator called ChromaLock published a video detailing how he modified a Texas Instruments TI-84 graphing calculator to connect to the internet and access OpenAI's ChatGPT, potentially enabling students to cheat on tests. The video, titled “I Made the Ultimate Cheating Device,” demonstrates a custom hardware modification …
Read More »Your Phone Won’t Be the Next Exploding Pager
For two days this week, Hezbollah has been rocked by a series of small explosions across Lebanon, injuring thousands and killing at least 25. But these attacks haven’t come from rockets or drones. Instead, they’ve resulted from boobytrapped electronics—including pagers, walkie-talkies, and even, reportedly, solar equipment—detonating in coordinated waves. As …
Read More »Did a Chinese University Hacking Competition Target a Real Victim?
Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking and security skills, and to assist employers and government agencies with discovering and recruiting new talent. But one security conference in China may have taken its contest a step further—potentially …
Read More »An AWS Configuration Issue Could Expose Thousands of Web Apps
A vulnerability related to Amazon Web Service's traffic-routing service known as Application Load Balancer could have been exploited by an attacker to bypass access controls and compromise web applications, according to new research. The flaw stems from a customer implementation issue, meaning it isn't caused by a software bug. Instead, …
Read More »The Slow-Burn Nightmare of the National Public Data Breach
Data breaches are a seemingly endless scourge with no simple answer, but the breach in recent months of the background-check service National Public Data illustrates just how dangerous and intractable they have become. And after four months of ambiguity, the situation is only now beginning to come into focus with …
Read More »Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
Google's flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running stock Android that's meant to be free of third-party add-ons and bloatware. On Thursday, though, researchers from the mobile device security firm iVerify are publishing findings on an Android vulnerability …
Read More »Your Gym Locker May Be Hackable
Thousands of electronic lockers found in gyms, offices, and schools could be vulnerable to attacks by criminals using cheap hacking tools to access administrator keys, according to new research. At the Defcon security conference on Sunday, security researchers Dennis Giese and “braelynn” demonstrated a proof-of-concept attack showing how digital management …
Read More »Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
Professional cycling has, in its recent history, been prone to a shocking variety of cheating methods and dirty tricks. Performance-enhancing drugs. Tacks strewn on race courses. Even stealthy motors hidden inside of wheel hubs. Now, for those who fail to download a software patch for their gear shifters—yes, bike components …
Read More »The Hacker Who Hunts Video Game Speedrunning Cheaters
Speedrunning video games, the competitive field of playing through digital games as quickly as possible, has in recent years been elevated into something between a virtuosic form of fingers-and-thumbs athletics and a highly technical science. The best speedruns reduce epic games meant to take dozens of hours to single-digit minutes …
Read More »