Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Evil Lightning cable about to hit mass distribution
- This topic has 1 reply, 1 voice, and was last updated 1 year, 6 months ago by .
A project by a self-taught electronics hacker named “_MG_” created a malicious lightning cable that looks just like the regular one by Apple. The catch is that his cord is a little bit different. His cable has an embedded tiny Wi-Fi transceiver. Crazy right? It can be used as an access point or a wireless client. When you plug this cord into your computer a hacker can gain access into your computer. An attacker can reach the cable from as far as 300 feet away!
You must be logged in to reply to this topic.