![]() But the cable contains a wireless implant that can be accessed from an attacker. The cables perform as expected-phones charge, iTunes opens, the usual dialog boxes appear. Cables given as gifts, provided by hotels or airport lounges, swapped out … the options are endless. It clearly has some frightening implications. ![]() … When it's used to connect a phone to a Mac, it enables an attacker to mount a wireless hijack. What’s the craic, Zak? Mister Doffman reports- Warning As Macs Are Remotely Hacked By Malicious … Lightning Cable: An iPhone Lightning cable that has been configured to enable remote, malicious access to a computer is not just on show at Def Con this year, it's on sale. Your humble blogwatcher curated these bloggy bits for your entertainment. What if something like it already has? In this week’s Security Blogwatch, we gently panic. Anything at all.Īnd now the researcher is manufacturing these “O.MG” cables in quantity. But what if it gets into the supply chain? Think of the possibilities: From the other side of the room-or of the planet-a hacker can: grab your passwords, steal your files, implant a persistent rootkit, or move laterally onto your corporate network. What looks like a regular phone cable actually pretends to be a keyboard that an attacker can remote-control. ![]() A security researcher miniaturized a malicious Wi-Fi microcontroller inside the tiny housing of a USB connector.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |