Palo Alto Crosswalk Signals Had Default Passwords
Palo Altoβs crosswalk signals were hacked last year. Turns out the city never changed the default passwords.
Palo Altoβs crosswalk signals were hacked last year. Turns out the city never changed the default passwords.

Hackers are more likely to target educational institutions than private businesses, government survey shows
When hackers attacked UK nurseries last month and published childrenβs data online, they were accused of hitting a new low.
But the broader education sector is well used to being a target.
Continue reading...
Β© Photograph: MBI/Alamy

Β© Photograph: MBI/Alamy

Β© Photograph: MBI/Alamy

Firm, which has 18 sites around London and more in US, India and China, has received ransom demand, say reports
The names, pictures and addresses of about 8,000 children have reportedly been stolen from the Kido nursery chain by a gang of cybercriminals.
The criminals have demanded a ransom from the company β which has 18 sites around London, with more in the US, India and China β according to the BBC.
Continue reading...
Β© Photograph: solarseven/Getty Images/iStockphoto

Β© Photograph: solarseven/Getty Images/iStockphoto

Β© Photograph: solarseven/Getty Images/iStockphoto

Barristers report going unpaid and cases being turned away amid fears firms will desert legal aid work altogether
Lawyers have warned that a cyber-attack on the Legal Aid Agency has pushed the sector into chaos, with barristers going unpaid, cases being turned away and fears a growing number of firms could desert legal aid work altogether.
In May, the legal aid agency announced that the personal data of hundreds of thousands of legal aid applicants in England and Wales dating back to 2010 had been accessed and downloaded in a significant cyber-attack.
Continue reading...
Β© Photograph: Hesther Ng/SOPA Images/REX/Shutterstock

Β© Photograph: Hesther Ng/SOPA Images/REX/Shutterstock

Β© Photograph: Hesther Ng/SOPA Images/REX/Shutterstock

How to prove your identity after your account gets hacked and how to improve security for the future
Your Facebook or Instagram account can be your link to friends, a profile for your work or a key to other services, so losing access can be very worrying. Hereβs what to do if the worst happens.
If you have access to the phone number or email account associated with your Facebook or Instagram account, try to reset your password by clicking on the βForgot password?β link on the main Facebook or Instagram login screen. Follow the instructions in the email or text message you receive.
If you no longer have access to the email account linked to your Facebook account, use a device with which you have previously logged into Facebook and go to facebook.com/login/identify. Enter any email address or phone number you might have associated with your account, or find your username which is the string of characters after Facebook.com/ on your page. Click on βNo longer have access to these?β, βForgotten account?β or βRecoverβ and follow the instructions to prove your identity and reset your password.
If your account was hacked, visit facebook.com/hacked or instagram.com/hacked/ on a device you have previously used to log in and follow the instructions. Visit the help with a hacked account page for Facebook or Instagram.
Change the password to something strong, long and unique, such as a combination of random words or a memorable lyric or quote. Avoid simple or guessable combinations. Use a password manager to help you remember it and other important details.
Turn on two-step verification in the βpassword and securityβ section of the Accounts Centre. Use an authentication app or security key for this, not SMS codes. Save your recovery codes somewhere safe in case you lose access to your two-step authentication method.
Turn on βunrecognised loginβ alerts in the βpassword and securityβ section of the Accounts Centre, which will alert you to any suspicious login activity.
Remove any suspicious βfriendsβ from your account β these could be fake accounts or scammers.
If you are eligible, turn on βadvanced protection for Facebookβ in the βpassword and securityβ section of the Accounts Centre.
Continue reading...
Β© Photograph: bigtunaonline/Alamy

Β© Photograph: bigtunaonline/Alamy

Β© Photograph: bigtunaonline/Alamy
![]()
You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT to help automate attacks. We also covered the dangers of [β¦]
The post Getting Started with AI Hacking: Part 1 appeared first on Black Hills Information Security, Inc..
![]()
In the world of cybersecurity, itβs important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether youβre an aspiring penetration tester, [β¦]
The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ appeared first on Black Hills Information Security, Inc..
![]()
by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched [β¦]
The post Satellite Hacking appeared first on Black Hills Information Security, Inc..
![]()
Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones!Β Today, I am going to show you the basics [β¦]
The post How to Install LineageOS on Your Android DeviceΒ appeared first on Black Hills Information Security, Inc..
![]()
This is part three of the blog series, Offensive IoT for Red Team Implants. We will be building off from where we left off in the last post, which can [β¦]
The post Offensive IoT for Red Team Implants (Part 3) appeared first on Black Hills Information Security, Inc..
![]()
This is Part Two of the blog series, Offensive IoT for Red Team Implants, so if you have not read PART ONE, I would encourage you do to so first [β¦]
The post Offensive IoT for Red Team Implants (Part 2) appeared first on Black Hills Information Security, Inc..
![]()
This is part one of a multipart blog series on researching a new generation of hardware implants and how using solutions from the world of IoT can unleash new capabilities. [β¦]
The post Offensive IoT for Red Team Implants β Part 1 appeared first on Black Hills Information Security, Inc..
![]()
Every Android application has a βmanifest.xmlβ file located in the root directory of the APK. (Remember APKs are just zip files.) The manifest file is like a guide to the application.
The post Field Guide to the Android Manifest File appeared first on Black Hills Information Security, Inc..
![]()
Jeff Barbi // *Guest Post Background Unless youβre pentesting mobile apps consistently, itβs easy for your methodologies to fall out of date. Each new version of Android brings with it [β¦]
The post Start to Finish: Configuring an Android Phone for Pentesting appeared first on Black Hills Information Security, Inc..
![]()
Hannah Cartier // Social engineering, especially phishing, is becoming increasingly prevalent in red team engagements as well as real-world attacks. As security awareness improves and systems become more locked down, [β¦]
The post Phishing Made Easy(ish) appeared first on Black Hills Information Security, Inc..
![]()
Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across [β¦]
The post Introducing LoRa (Long Range) Wireless Technology β Part 1 appeared first on Black Hills Information Security, Inc..
![]()
Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology [β¦]
The post Understanding Zigbee and Wireless Mesh Networking appeared first on Black Hills Information Security, Inc..
![]()
Ray Felch // IntroductionΒ Recently, I came across an interesting article on using software-defined radio (SDR) to create aΒ Police, Fire,Β EMS,Β and Public Safety systems scanner. Viewing a few of these Trunk [β¦]
The post Using SDR to Build a Trunk Tracker β Police, Fire, and EMS Scanner appeared first on Black Hills Information Security, Inc..

![]()
Ray Felch // DisclaimerΒ When using an FM transmitter, do notΒ modifyΒ the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain [β¦]
The post Information From Thin Air: Using SDR to Extract DTMF from Radio Waves appeared first on Black Hills Information Security, Inc..
![]()
Ray Felch // OverviewΒ Infrared technology has been around for a very long time and is a wireless technology used in devices that convey data by way of Infrared radiation. [β¦]
The post Using Infrared for Hardware Control appeared first on Black Hills Information Security, Inc..