Skip to main content

Posts

Showing posts from October, 2012

Pacemaker hack can deliver deadly 830-volt jolt

Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software  programming  by medical device companies. The new research comes from Barnaby Jack of security vendor IOActive, known for his analysis of other medical equipment such as insulin-delivery devices. Security researcher Barnaby Jack of IOActive revealed new research on Wednesday that showed pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device manufacturers. Image credit: Breakpoint Jack, who spoke at the Breakpoint security conference in Melbourne on Wednesday, said the flaw lies with the programming of the wireless transmitters used to give instructions to pacemakers and implantable cardioverter-defibrillators (ICDs), which detect irregular heart contractions and deli

How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)

I have already written a post on hacking into someone's PC which was using Beast Trojan, you can check that by clicking  here , and this time, i will show you how to configure ProRat Trojan to hack into your victim's computer. ProRat is also a Trojan making program which is similar to Beast Trojan but in compare to Beast, ProRat is much better. It can connect to the server more faster. It has more features/functions to play with your victim's PC. Easy to configure. Lets start the Tutorial: Download ProRat  and extract anywhere in your PC. Now run  ProRat.exe  and then click on  Create- Create ProRat Server (342 Kbayt) From the  Notifications tab , in the first option  "Use ProConnective Notification"  type your IP address. (If you don't know your IP address, simply click on the red arrow and it will automatically fill your IP address). Now in the second option  "Use Mail Notifications"  type your Email address where you want to

This hack can remotely wipe your Samsung Galaxy S III

It's bad enough when you clumsily manage to wipe a few odd bits of data off your phone by accident. But what if your entire phone was wiped, AND your SIM-card killed, remotely by hackers without you being able to do a single thing to stop them? That's the issue being faced currently by owners of the  Samsung Galaxy S  III,  Galaxy S II , Galaxy Beam, S Advance and  Galaxy Ace . Nearly all of Samsung's major Android releases have been shown to be susceptible to a malicious hack that will see the entire contents of a user's phone wiped clean. The hack was outed by Ravi Borgaonkar at the Ekoparty security conference, detailing a simple USSD code (easily sent through a website, QR code or NFC pairing) that would perform an unstoppable, irreversible factory reset on affected handsets. As well as the wipe, the hack can also be paired with another attack that breaks SIM-cards, meaning that even if you've got contact data backed up on the card, it too could be lost

Hack A Kindle To Work With A Raspberry Pi

Your ereader isn’t the most exciting device you could use as a monitor, but it’s a minimal solution that could come in handy when you’re on the road. Damaru over at Ponnuki shows us how to turn a Kindle into a display using a Raspberry Pi. Using the Kindle as a screen, Damaru use a Raspberry Pi, a couple of USB cables and a keyboard to create a very minimal little computer. You do have to  jailbreak the Kindle  for this to work, but the rest of the process is pretty simple. From there, you only need to run a few things to get screen-sharing to work, create a system for automatic login, and you’re done. It’s about as minimal of a working environment as you can get. If you want to give it a shot yourself, head over to Ponnuki for the full guide. Kindleberry Pi