• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 28th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

7 Unexpected Hacks of 2015, Thanks To DefCon and Black Hat

August 8th, 2015 Farzan Hussain Security 0 comments
7 Unexpected Hacks of 2015, Thanks To DefCon and Black Hat
Share on FacebookShare on Twitter

This year, at DefCon 23 and Black Hat USA 2015 security conferences, hackers are going to discuss how vulnerable and severely flawed our day-to-day things really are.

Here at HackRead.com, we have brought you 7 much awaited hacking discussions that are related to the technologies towards which most of the individuals are looking forward to including vehicle, smartphones, weapons, computers, and skateboards.

So let’s look at what are those concerns and vulnerabilities that hackers have found after the implementation of Internet and modern technologies into these gadgets and hardware.

#1: Remotely Hacking a Jeep

In this Black Hat USA 2015 session, two security researchers namely Charles Miller and Chris Valasek will give a presentation about their discoveries related to the security vulnerability they found in the onboard infotainment system of all the vehicles manufactured by Fiat Chrysler Automobiles, leaving more than 470,000 vehicles vulnerable to these similar hacking attempts.

Using this vulnerability, both of these hackers managed to remotely take control over the vehicle, which allowed them to manipulate the vehicle’s brakes, acceleration, entertainment system and what not.

Head over to this link to know more about how hackers remotely took control of a Jeep while it was on the highway.

jeep-cherokee-on-board-system-hacked-more-than-470000-vehicles-at-risk

#2: Android Stagefright Exploit – Left 950 Million Android Users Vulnerable

Did you ever think that your smartphone running Android mobile operating system could be hacked with just a single text message?

Well, that is possible now as a Zimperium’s Mobile Security Expert Joshua Drake found a security bug within the Android Media Playback Tool codes. This bug allowed him to remotely execute malicious code in the targeted Android smartphone just by sending a simple text message embedded with a malicious code.

This security bug codenamed Stagefright, is believed to be one of the most devastating hacks in the history of mobile software, which left whopping 950 million Android-based smartphones vulnerable to the security threat.

Head over to this link to know how Drake managed to find Android Stagefright exploit.

android-stagefright-bug-is-critical-let-hackers-snoop-into-your-phone-silently

#3: Remotely Hack Linux-Powered Sniper Rifles

You don’t believe that heading, right? At first, we neither. Until this married couple Runa Sandvik and Michael Auger, surprisingly both are researchers too, managed to hack two self-aiming sniper rifles, gaining access over the self-aiming functionality. It took them almost a year to discover and exploit the vulnerability in the rifle.

Actually, these self-aiming rifles are powered by a Linux-based system, allowing any novice shooter to make perfect shots, even if the target is 1000 yards away.

You must be wondering that what makes this rifle vulnerable to remote hacking, right? The rifle manufacturer implemented a Wi-Fi accessibility within the gun, making it vulnerable to hacking.

So security researchers found a vulnerability in the software of Wi-Fi functionality that allowed them to remotely alter the shooting calculations made by rifle, making it miss the target.

Head over to this link to learn more about what else these researchers did after remotely hacking the Linux-powered sniper rifle.

computer-controlled-sniper-rifle-hacked-3

#4: Remotely Locate, Unlock and Start GM Vehicles Using A Mobile App

Do you own any GM vehicle that is equipped with the OnStar system? Beware because a security researcher Samy Kamkar has found a vulnerability within the OnStar’s mobile app named RemoteLink, which allowed him to remotely locate, unlock, start, honk the horn, and turn on the headlights of a vehicle. He can perform all those tasks that your RemoteLink app is capable of, remotely!

Kamkar also developed a $100 gadget that allowed him to remotely connect to any OnStar equipped GM vehicle. He codenamed it OwnStar.

Head over to this link to see him controlling a Chevy Volt after hacking OnStar’s RemoteLink app.

onstar-100-hack-can-remotely-locate-unlock-and-start-gm-vehicles-4

#5: Thunderstrike 2 – Permanently Hack Apple MAC Computers

Do you know your MAC computer can be permanently hacked? Recently, a team of researchers found a number of vulnerabilities within the core firmware of the MACs. And using this vulnerability they made a worm that can permanently infect any MAC based computer system.

This exploit is so risky that once your MAC is infected then the only possibility to fix it is by re-flashing the infected chip.

Security researchers Trammell Hudson and Xeno Kovah codenamed this firmware vulnerability as ‘Thunderstrike 2’. They have planned to demonstrate this exploit at Black Hat USA 2015.

To know more about what Thunderstrike 2 is capable of and how it can permanently hack MAC computer then head over to this link.

firmware-worm-to-permanently-infect-macs-in-seconds

#6: Remotely Hacking Electronic Skateboards

Two security researchers Rico Healey and Mike Ryan accidentally found a vulnerability in the on-board system of the Bluetooth controlled electronic skateboards, which allowed them to remotely hack the skateboard, taking complete control over it.

The researchers have planned to demonstrate the several security vulnerabilities at DefCon 23 security conference. They said that these vulnerabilities make it a risky ride for those using it to commute. They codenamed the vulnerability as ‘FacePlant’.

To know more about remotely hacking a Bluetooth-enabled electronic skateboard then head over to this link.

electronic-skateboards-are-easy-to-hack-4-5

#7: Stealing Data Using Radio and Sound Waves

All your computer data isn’t secure anymore, even if your computer is not connected to the Internet. Security researcher named Ang Cui found out that there’s a possibility to remotely steal data just by transforming any infected hardware or device into a transmitter, which then transmits radio frequency signals that can be received by software controlled AM receiver.

This isn’t any concept or theory. The researcher himself is going to present, brief and provide a live demonstration of his inventive hack at Black Hat USA 2015. He codenamed it as ‘Funtenna’.

shield-your-computers-from-radiofrequency-hackers-can-steal-data-using-radio-and-sound-waves-1

Are you interested in the video demo of how Ang Cui snooped over a simple data using an infected printer and his technique? Head over to this link.

  • Tags
  • Black Hat
  • DefCon
  • hacking
  • internet
  • security
  • Vulnerability
Facebook Twitter LinkedIn Pinterest
Previous article Tiny Drones Using Insect-Like Vision for Better Navigation
Next article Hackers Turn Bus Terminal into Adult Movie Theater
Farzan Hussain

Farzan Hussain

I am Mohammad Farzan! A technology and gadget enthusiast as well as a creative content writer with over six years of experience in writing engaging content. You will mostly find me writing occasional blog posts, designing websites, capturing photos, social networking and listening to music.

Related Posts
World's Most 'Resilient Malware' Botnet Emotet Taken Down

World's Most 'Resilient Malware' Botnet Emotet Taken Down

Top Cybersecurity Threats to Watch in 2021

Top Cybersecurity Threats to Watch in 2021

Database of 176 million Pakistani mobile phone users sold online

Database of 176 million Pakistani mobile phone users sold online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
NetWalker ransomware disrupted - Cryptocurrency and domain seized
Cyber Crime

NetWalker ransomware disrupted - Cryptocurrency and domain seized

44
Transferring Whatsapp data from iPhone to Android with MobileTrans
How To

Transferring Whatsapp data from iPhone to Android with MobileTrans

30
World's Most 'Resilient Malware' Botnet Emotet Taken Down
Cyber Crime

World's Most 'Resilient Malware' Botnet Emotet Taken Down

86

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us