The inconspicuous lock hacking device is an adaption of one demonstrated at the Black Hat security conference in July by Cody Brocious, a hacker and software developer for Mozilla, who discovered and exploited a vulnerability in Onity locks, a cheap and popular hotel room lock that the company says are used on at least four million hotel rooms worldwide.
FORBES: Hackers Crack Hotel Room Locks With A Tool Disguised As A Dry Erase Marker
At the time, Mr. Dotcom set up a software-hacker community and a computer system used to upload pirated software from others, Mr. Bogk said.
SmartThings covers this base with a software development kit and a API that seeks to provide everything a good software hacker needs to integrate SmartThings devices into his or her apps.
FORBES: Could An Internet Of Things Startup Be The Next Microsoft? Three Hobby Kits Hold Promise
In a presentation at the Black Hat and Defcon security conference in July, for instance, French security researcher Andre Costin presented vulnerabilities in the next-generation air traffic control system known as ADS-B that he said would allow a hacker with a software-defined radio to track and even spoof planes in the sky, potentially creating dangerous distractions for pilots.
FORBES: DARPA-Funded Radio HackRF Aims To Be A $300 Wireless Swiss Army Knife For Hackers
Using a hacker currency like Bitcoin, software designed to cloak online actions in anonymity, and enough willing participants, this black market can be recreated with relative ease if Silk Road is ever taken down.
FORBES: How Technology Complicates The War On Drugs: Guns And Drugs For Sale Online
When IBM filtered those unpatched security flaws by severity, however, Google came out as the least likely to patch critical security bugs in its software that would allow a hacker to completely hijack a target system, leaving 33% of those high severity flaws unpatched over the first half of the year.
The hacker managed to break into the DISA and steal software that the DISA used to manage some of those networks.
To be sure, Temmingh's software is a result of his experiences as a hacker.
That security flaw was first publicly demonstrated by Cody Brocious, a 24-year-old software developer for Mozilla, at the Black Hat hacker conference in July.
FORBES: Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins
Charlie Miller is an NSA-trained hacker with an elite reputation for tracking down dangerous security flaws in software.
FORBES: Researcher Will Expose 20 Hackable Apple Security Flaws
Both of the hacker attacks were made possible because of bugs in Microsoft's Explorer software.
In 2000, member studios of the Motion Picture Association of America successfully sued the hacker magazine 2600 for offering readers access to DeCSS, a piece of software used to break DVD encryption.
He was just doing his job as a so-called white-hat hacker for AirTight Networks, a manufacturer of wireless intrusion protection hardware and software that was invented in India and brought to market in the U.S. AirTight's chief executive, David King, sends hackers out for unsolicited security assessments.
And in May a team of researchers at the Universities of Washington and San Diego showed that the software that controls many cars could be easily compromised to allow a hacker to turn off brakes, shut down an engine or even control a car's horn, windshield wipers and doors.
An apologetic computer hacker has been sentenced to nearly four years in prison, following a conviction of software piracy.
Those with the software skills to create new designs and upload them to the site are rewarded with hacker fame and remixes from others in the digital DIY community.
FORBES: Inside Thingiverse, The Radically Open Website Powering The 3D Printing Movement
In a talk at the Black Hat security conference in Barcelona Thursday, Greek researcher Thanassis Giannetsos plans to present a new software tool that he and two colleagues have written that they say would allow a malicious hacker to penetrate a sensor network and change or delete data at will.
FORBES: Researcher Throws A Wrench In IBM And HP's Sensor Networks
Peter Bell, who recently joined hackNY as an evangelist and hacker, is sick of the myths that are propagated about how best to prepare for a startup-focused software development career.
FORBES: What Students Really Need to Learn to Get a Startup Job
应用推荐