In this issue we talk about: Browser-in-the-Middle, Car Hacking, Hack-for-hire, Spying via webcam, EVE-NG, Forensic analysis, Metasploitable3, IP cameras, Instagram, Show/hide password…
We are seeing a rapid increase in the number of connected devices on the Net, from the smartphone to the smart home. This is good! But if on the one hand this brings advantages in terms of comfort and efficiency, on the other it opens up risks that we could not even imagine a few years ago. Think of the threats that come with the worrying trend of car hacking. Modern vehicles—increasingly connected, with features like infotainment, climate control, and even autonomous driving—are quickly turning into perfect high-risk targets. And the ability to hack cars is by no means just a theoretical threat. In 2015, security researchers were able to take control of a Jeep Cherokee, turn the engine on and off, activate the brakes, and even turn the steering wheel. In another case, a group of hackers managed to steal a Tesla in less than 90 seconds, using only a laptop and a radio device. The techniques? II phishing, malware and social engineering, which allow hackers to gain access to the board system and take control. A permanent solution? It’s not easy to find! And maybe it will never be found. What can be done – even if there are now various measures that manufacturers adopt for protection on vehicles – is to implement other controls, invest in encryption and multi-factor authentication. Prudence (and safety,
JOURNAL http://www.hackerjournal.it
I would add) it’s never too much!
Gianmarco Bruni
EDITORS redazione@hackerjournal.it
BACK SUBSCRIPTIONS
abbonamenti@sprea.it http://www.sprea.it/digital
