To see how hackers get rid of macOS system in 5 seconds on Black Hat 2016, "stimulating" ATM machine | Home Weekly

1. Black Hat 2016 Special Report

Chinese hackers kill macOS system for 5 seconds, the first global attack method

The user clicked on a link on the Apple computer. In his eyes, everything was so calm. However, he did not know that with the click of a whisper, countless data rushed into the computer. During the five seconds of the second hand, Apple’s top programmers were destroyed by the layered defense system built by the code, and the God of cyberspace quietly changed hands. Between the electric light and the Flint, the hacker seized all the rights of the computer.

This incident really happened in the "Hacker Games" - Pwn2Own 2016. It was the hackers from the Tencent Cohen Lab that made this gorgeous attack. The heinous thing is that they also used another gesture, again causing the macOS world to crash.

It is this astounding hacker aesthetic that helped them succeed in the title of "Master of the World".

Since March of this year, the whole world has been waiting for the "masters" to reveal the secret attack method. Five months later, Cohen's hackers finally decided to restore the technical details of the attack. The stage they chose was BlackHat USA, the highest event in the hacker community.

Android system security has been saved? Chinese hackers come up with artifacts  

Android system is safe.

This is the biggest joke in the eyes of hackers.

Exaggerating, even a script kid can easily find a solution on the Internet and break your cell phone defense. The reason for this result is not that Google does not act in terms of system security, but that most Android phones that exist in the human world have become "lost lambs." Due to the fragmentation of the system and the cumbersome process of vendor updates, these mobile phones simply cannot find the door to upgrade. They can only be left alone in the wilderness of the wolf and tiger leopard.

Baidu’s chief security scientist, Wei Wei, calls it “ecological security breach” and “leukemia of the Android system”.

Incredibly, on top of BlackHat USA, the top hacking gathering, the hacker has been calling for Android system security for three consecutive years. Just today, he once again climbed the top stage of this global hacker. This time, he resorted to an "artifact."

At the end of the speech, Lei Feng network had an exclusive interview with Wei Wei, let us tell him about what this "artifact" is.

Dangerous, hackers suddenly turn a high-speed car

Imagine driving through the azure beach and wondering if you have the opportunity to swim here. Suddenly, your car's steering wheel suddenly spins and it's too late to react. Your dream of swimming at Blue Ocean has been realized with the car.

This is not because you bought a car that would "read". You are very likely to provoke a car hack.

There are more than two of the world's most famous car hackers: Charlie Miller & Chris Wallacek.

At BlackHat USA, the world's top hacking party in 2015, they staged a car break show that shocked the world. In that presentation, they demonstrated the remote intrusion into the Jeep on-board system, which remotely controlled various functions on the startup vehicle, including deceleration, shutting down the engine, braking or letting the brakes fail. This world-famous game has caught the world in shock.

Hackers “emerge” ATM machines on the spot, and can inject 50,000 US dollars in 15 minutes

At the world's top hacking party BlackHat, there is no shortage of local tyrants. Everyone who stands to share on the stage can use his own technology to make a lot of money. However, just as BlackHat came to a close, a real embarrassment arose. Because he can make any ATM machine spit out 50,000 US dollars, if the uncle also agreed.

Visually examining Weston Hecker (Weston Hacker), the surnamed "hacker" created the highest share of BlackHat's attendance at this time. Because there are more than one person and Lei Fengwang editor, is to witness the ATM machine "banknote" and came to the scene.

Weston Hecker told the “thought thirsty” audience that he could not “hypnotic” the ATM machine out of thin air, but instead created a gadget that had to be inserted into the bank card entrance in advance. In this way, when the unclear people use the ATM, the gadget will record the interaction data between his bank card and the ATM, such as bank card number and password.

2. The world's largest hacking party, ten cold knowledge of "DEFCON"  

If you are not satisfied with certain things in the world, and decided to use all possible ways to achieve your goals. Congratulations, you are becoming a hacker.

The hackers who dare to confront the impossible middle finger all over the world will gather in Las Vegas every year to participate in a grand party called DEFCON.

Technology, hacking, geeks, strange coffee, and alcohol, DEFCON appears in the memory and media description of the world with its unfathomable image. However, this defiant attitude has made DEFCON a lot of spirits including Chinese hackers. temple. As the saying goes, "If you are born, why not get rid of the shackles."

The United States local time on August 4, 2016 (Beijing time on August 5), this hacker Party started in 1993 is about to usher in the 24th reunion. To learn about the gathering of the global hackers No1, let’s take a look at the ten cold knowledge about it.

3. Depth | Bai Wuhui Zhao Wu: Creating a corporate threat awareness artifact in the name of Andersen

It is an ideal for each start-up company to turn from an unapproved “ugly duckling” to a “white swan” that is envied by everyone. Helping these start-ups solve security problems and achieve their dreams of better transformation is also the main service goal of the White Hat Andersen platform. Zhao Wu said, “Taking Andersen's name not only fits the difficulties of starting a business, but it is easy to remember because of the good intentions of the future.”

The LOGO of Andersen's platform also used the image of a duckling.

Andersen’s full name is Andersen’s corporate threat perception platform. The SANS Institute defines threat intelligence as a set of data for security threats, threaters, exploits, malware, vulnerabilities, and hazard metrics, collected applications for evaluation. White Hat Lodge simply defines threat intelligence as:

Whoever wants to engage you, who gets you, and wants to do it, threatens intelligence that threatens corporate security.

Zhao Wu told Lei Fengwang (search for "Lei Feng Net" public concern) that companies are usually unfamiliar with their own assets. This will lead to the discovery of vulnerabilities and the repair efficiency is very low.

There was once a giant company that used a patch for three days because of insufficient knowledge of its own assets.

To timely and accurately find corporate security threat intelligence, Andersen’s platform will first sort out the company’s assets and put it on a fingerprint.

4. Secret: How does Hillary rely on technology to “left and right” elections?

WikiLeaks made the American Democrats bored.

On July 22, 2016, WikiLeaks disclosed nearly 20,000 emails sent by the Democratic National Committee (DNC). This incident has become the largest political scandal in the history of the United States except the Watergate incident. On July 28, WikiLeaks continued to publish 19 DNC high-level telephone recordings.

Hillary's campaign advantage is therefore greatly reduced. Most spectators think that this is a failure of Clinton's technical team. However, DNC was invaded, not the Hillary team. The Hillary team has only one program that is running on the DNC system and is intruding. It is unclear how big the problem is. "Mail Doors" In the final analysis, DNC ignored the consequences of cybersecurity assessment warnings.

In fact, many people, along with Republican opponents, are not aware of Hillary’s truly terrible election machine—a super team of “tech geniuses” from Silicon Valley. They did set a great deal for Hillary’s campaign.

This is the most scientific and digital election in history. Before George W. Bush, the Internet was still just an ATM for the presidential campaign team. They didn't know that the Internet had to do a system to allow voters to fill out cheques and to do more than just donate money. As of July 2016, Clinton’s technology team already has more than 50 people, which is equivalent to a small-scale Silicon Valley technology startup.

The core product they developed was Hillary Clinton himself. This team of science and technology has so far brought about $240 million in funding for Hillary.

Siren and Alarm

A siren is a loud noise-making device. Civil defense sirens are mounted in fixed locations and used to warn of natural disasters or attacks. Sirens are used on emergency service vehicles such as ambulances, police cars, and fire trucks. There are two general types: pneumatic and electronic.

Many fire sirens (used for calling the volunteer fire fighters) serve double duty as tornado or civil defense sirens, alerting an entire community of impending danger. Most fire sirens are either mounted on the roof of a fire station or on a pole next to the fire station. Fire sirens can also be mounted on or near government buildings, on tall structures such as water towers, as well as in systems where several sirens are distributed around a town for better sound coverage. Most fire sirens are single tone and mechanically driven by electric motors with a rotor attached to the shaft. Some newer sirens are electronically driven speakers.

Fire sirens are often called "fire whistles", "fire alarms", or "fire horns". Although there is no standard signaling of fire sirens, some utilize codes to inform firefighters of the location of the fire. Civil defense sirens also used as fire sirens often can produce an alternating "hi-lo" signal (similar to emergency vehicles in many European countries) as the fire signal, or a slow wail (typically 3x) as to not confuse the public with the standard civil defense signals of alert (steady tone) and attack (fast wavering tone). Fire sirens are often tested once a day at noon and are also called "noon sirens" or "noon whistles".

The first emergency vehicles relied on a bell. Then in the 70s, they switched to a duotone airhorn. Then in the 80s, that was overtaken by an electronic wail.

Piezo Alarm,Siren And Alarm,Piezo Buzzer Siren,Piezo Buzzer Alarm Siren

Jiangsu Huawha Electronices Co.,Ltd , https://www.hnbuzzer.com

Posted on