article thumbnail

How to hack Wincor Cineo ATMs to bypass black-box attack protections and withdraw cash

Security Affairs

“According to Vladimir Kononovich, some manufacturers rely on security through obscurity, with proprietary protocols that are poorly studied and the goal of making it difficult for attackers to procure equipment to find vulnerabilities in such devices. Wincor is currently owned by ATM manufacturer giant Diebold Nixdorf.

article thumbnail

MY TAKE: How decentralizing IoT could help save the planet — by driving decarbonization

The Last Watchdog

This was the theme of Infineon Technologies’ OktoberTech 2023 conference, which I had the privilege of attending at the Computer History Museum in the heart of Silicon Valley. The theme of their conference, Driving decarbonization and digitalization – together , defines the company’s culture. Very well said!

IoT 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

The Security Ledger

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings. The post Episode 254: Dennis Giese’s Revolutionary Robot Vacuum.

IoT 75
article thumbnail

OpenText World Europe 2024 has taken flight

OpenText Information Management

At our premiere information management conference OpenText World Europe 2024 this week, the attention is focused on new innovations that meet new customer needs. For most businesses, AI has introduced a new mindset, a new way to think, a new appreciation for trust and data, and a new outlook on how to unleash human potential.

Cloud 67
article thumbnail

Apprenticeship Stories: Lavinia Bentley

CILIP

CILIP Copyright COnference 2024 By Lavinia Bentley, Archive Assistant, Jaguar Daimler Heritage Trust, Collections Centre, British Motor Museum Is starting an apprenticeship in the 60th year of your life a good idea? In my experience the answer is a resounding yes. now renamed Jaguar Land Rover Ltd.)

article thumbnail

Hackers bypassed vein based authentication with a fake hand

Security Affairs

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from a photo. If you consider vein based authentication totally secure, you have to know that a group of researchers demonstrated the opposite at the Chaos Communication Congress hacking conference.

article thumbnail

Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle

Security Affairs

A security duo has demonstrated how to hack a Tesla Model X’s and open the doors using a DJI Mavic 2 drone equipped with a WIFI dongle. Automotive manufacturers can scale up their software testing and remediation pipelines by orders of magnitude by using KunnaEmu. The researchers Kunnamon, Inc.’s concluded Dr. Weinmann.