Thursday, February 13, 2020


O.MG Cable Privacy Threat

How do you charge your wireless devices?
While wireless charging is gaining popularity as a way to charge up our phones, the vast majority of people still use cables. If you’re an iPhone or iPad user, then your cable of choice is likely the Lightning Connector.
The Lightning Connector was Apple’s replacement for their longstanding 30-pin dock connect used on iPods, iPhones, and iPads until 2012. Making its debut on the iPhone 5, Lightning was a massive upgrade for Apple users looking to charge or sync their devices. It was usable in any orientation, much smaller than the old connector, and was much more durable. Today, if you own an Apple device, you probably have a ton of Lightning Cables lying around your home or office.
However, a recent innovation called The O.MG Cable is a privacy nightmare for those who own Apple devices.

Tuesday, February 11, 2020

Wireless Tech to Steal Luxury Cars in Seconds...

Motherboard obtained a video of a so-called relay attack from EvanConnect, who sells keyless repeaters that can be used to break into and steal luxury cars.

As they both walked through a dimly lit parking garage, one of the pair of men peered at a black, laptop-sized device inside his messenger bag. Using buttons on its outer case, he flicked through various options on the device's bright LED screen before landing on his choice.

With the device armed, the second man walked towards a bright white Jeep parked in the garage. He held his own piece of technology: a small box with an antenna jutting from the top. The man tried to open the car's door, but it was locked. He pushed a button on the top of his handheld device, a light flickered, and instantly the car was open. He clambered into the driver's seat, and pushed the button to start the vehicle.

Friday, August 9, 2019


Do you always want the latest and greatest when it comes to technology?

As the march of communication technology continues, new and innovative tools come out every day that improve our lives and make our data more secure. Well, that’s the theory, anyway.

The reality is that there can be a real “look-before-you-leap” problem when it comes to communication technologies. Just take a look at 5G, for example.

5G is considered to be the next step up in mobile communication. Just how LTE was a massive improvement over 3G, 5G looks primed to change the landscape when it comes to wireless devices completely. With major carriers, including AT&T and Verizon, rolling out their 5G networks later this year, you should know that it might not be quite as safe as advertised…

Sunday, July 21, 2019


Do you want to know one of the biggest cybersecurity risks out there for individuals and organizations? Publicly accessible information.
Every other week, you read about some massive organization that had their data hacked and released on the web. Sometimes, this data was out there on the dark web for months and months before anyone noticed, only becoming evident when the information was somehow used against them. But by the time that the organization is forced to take action, it’s often too late for anything but damage control.
How does this information get out there? Well…

Tuesday, July 16, 2019


When you think of NASA, you think of the cutting edge of science and space exploration. These are the people who were responsible for the moon landing, the Mars missions, and countless technological innovations that have defined the world as we know it today.
What you might not think of is inadequate and out-of-date security, but here we are.
In June of 2019, NASA confirmed that its Jet Propulsion Laboratory (JPL) was hacked back in April 2018. What’s worse is that this hack remained undetected for almost one year. It doesn’t exactly fill you with confidence about our nation’s space agency, does it?
While the final extent of the damage is not (and may never be) known, NASA has confirmed that malicious actors stole approximately 500 MB of data related to the Mars missions. If you follow the news, these missions involve sending unmanned drones (such as the Curiosity rover) to the red planet to gather information. If things go well, the plan is to send a crewed mission at some point in the 2020s.
So, how was this high-tech cyber heist accomplished? Through espionage worthy of a Mission: Impossible movie? Nope. What if we told you that it was all because of an unauthorized Raspberry Pi?

Thursday, March 21, 2019

Hundreds of motel guests were secretly filmed and live-streamed online..

About 1,600 people have been secretly filmed in motel rooms in South Korea, with the footage live-streamed online for paying customers to watch, police said Wednesday.
Two men have been arrested and another pair investigated in connection with the scandal, which involved 42 rooms in 30 accommodations in 10 cities around the country. Police said there was no indication the businesses were complicit in the scheme.

In South Korea, small hotels of the type involved in this case are generally referred to as motels or inns. Cameras were hidden inside digital TV boxes, wall sockets and hairdryer holders and the footage was streamed online, the Cyber Investigation Department at the National Police Agency said in a statement.

Saturday, February 16, 2019

USB Cable Allows Remote Attacks over WiFi

*Note, ComSec's Cyber TSCM Inspection, Utilizing the "ORIUS WIFI" analyzer would reveal this threat within seconds. Contact us, we can help. J.D.L.~

Like a scene from a James Bond or Mission Impossible movie, a new offensive USB cable plugged into a computer could allow attackers to execute commands over WiFi as if they were using the computer's keyboard.

When plugged into a Linux, Mac, or Windows computer, this cable is detected by the operating system as a HID or human interface device. As HID devices are considered input devices by an operating system, they can be used to input commands as if they are being typed on a keyboard.

Created by security researcher Mike Grover, who goes by the alias _MG_, the cable includes an integrated WiFi PCB that was created by the researcher. This WiFi chip allows an attacker to connect to the cable remotely to execute command on the computer or manipulate the mouse cursor.