Posts

Showing posts with the label device

Using a drone, the hacker opened the door of the running Tesla car

Image
Using a drone, the hacker opened the door of the running Tesla car Cyber ​​researchers Rafael Philippe and Benedict Smogel have discovered a flaw in Tesla's 'Model X' car. With the help of two drones and a Wi-Fi drone, they managed to open the door of a Tesla car speeding on the road. They managed to open the door of a Tesla car running on the road through Intel's open-source software Con Man, which manages network connections. They even managed to change the position of the seat from the drone. According to him, all the things that a driver can do by using the button on the console from the drone, they have found the kind of weakness that can be done from the drone. They discovered this weakness towards the end of 2020. Since then, Tesla has addressed the issue with a new version of the software update. The company said it would provide them with 31,500 in bug bounty. Researchers have speculated that the problem, seen in Tesla's car, could be seen in other vehicles

What is social engineering hacking and how is data stolen from it?

Image
What is social engineering hacking and how is data stolen from it?  We have gadgets, but when we don't know how to use them safely, we run into complex technical problems like hacking and phishing. But since the recent hacking scandals have surfaced, users have become aware of the need to use strong passwords. Previously, when using weak passwords, hackers used various techniques to easily obtain such passwords through brute force attacks. So nowadays users use very complex and randomly generated cryptographic strengths to strengthen their passwords. It is not easy to break the password by attacking brute force on such passwords. But if you read the news related to cybersecurity, the incidents of hacking the credentials of various accounts and hacking the systems of the organization are more common nowadays. The only reason for this is that nowadays hackers are becoming smarter and smarter. They are adopting the techniques of phishing and social engineering. Hackers do not have to