Get Your Free Subscription By Email:

Hacking Passwords

Russia Finds Hidden Chips Inside Chinese Electric Iron And Kettles That Scans Wi-Fi To Serve Malware

News reports from Russia's state-owned channel Rossiya 24 showed footage of a technician opening up an iron included in a batch of Chinese imports to find a "spy chip" with "a little microphone" embedded into it. These hidden, embedded electronic chips are scanning and connecting to any computer within a 200m radius with unprotected Wi-Fi networks, once connected these "Trojan devices" were being used to spread viruses.

While the report says that the malware is being used to send SPAM, piggy-banking on infected computer's internet connection and resources without the owner's knowledge about it, our recent story "Hidden Backdoor In Your Internet Router - With Love, From China !!" and the fact that the rogue devices had "an microphone" further establishes the fact that these are or can be used for spying. The researchers also found other products having these rogue components including mobile phones, car dashboard cameras and electric kettles.

Kettle Malware

Hidden Backdoor In Your Internet Router - With Love, From China !!

Chinese telecom companies have been accused of embedding spying technologies into enterprise level telecom hardware for Chinese government, now a new research done by embedded device hacker "Craig Heffner" unearthed that consumer level internet router's made by Chinese companies come bundled with a secret backdoor which allows full root level access to the consumer router.

He unveiled secret backdoors embedded inside a number of D-Link and Tenda brand routers which are manufactured in China and are sold all around the globe. The beauty of this type of backdoor is that these are undetectable by antivirus software's and bypass almost all sorts of security measures as the loophole is sitting at the very start of network access chain supplying and controlling access to everything else after it - this is sort of your gatekeeper being the enemy Trojan. Unlike NSA PRISM spying this would also be a more easy, distributed, cost-efficient and targeted form of government spying.

Tenda

Learn How To Hack Computers, Emails, Websites And Applications

HackingHacking is an art and can be used for both offense and defense, for pro-active defense you need to know hacker tactics for securing yourself/organization against hacking, there exists a very thin line of hacker ethics distinguishing between a WhiteHat and a BlackHat hacker, I have always been very curious in learning this dark art for ethical purpose and finally got hold of "The Secret Of Hacking" - Ethical hacking course, unlike other outdated ebooks and basic courses this one is authored by an established Government recognized Indian security company and really packs a punch with all aspects of hacking and securing as promised on the sales page.

Best Hacking Book And Course

The course comes with one printed book and two DVD's having more then 14500 security related tools and 200+ Hacking E-books/Videos, the best part is that you get a lifetime membership with access to an ever growing collection of videos and technical support.

Subscribe to RSS - Hacking Passwords
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.