tumblr_inline_n3f64snek31qclfey[1]

Using flying drones to hack your smartphone data

Security researchers in London have successfully pulled off a hack for a program called “Snoopy,” that controls a flying drone which finds smartphones in any given area and steals it’s data. According to the researchers, the program utilizes drones to fly over areas and scan for smartphones with open Wi-Fi connections. If they’re found, the[…]

hacking

Hacking of the future, infecting computers using audio signals

I’m in awe of how impressive this is. Computer scientists have developed proof-of-concept software, that uses inaudible audio signals to communicate with each other. And with the communication, they can then transfer data such as malware, from speakers and microphones within short distances of each other. The computers don’t even need to be connected to the Internet[…]

SQL Injection

A layman’s explanation of what a SQL Injection is

You may have heard the term SQL Injection before. SQL, which I pronounce it as “sequel,” but actually means Structured Query Language, is a programming language primarily used for managing data storage. And in today’s world of the Internet, information, and large databases, hacking has become a commonplace and so has the term SQL Injection. Thanks to[…]