Hardware Hacking

This section talks about all the different parts of hardware hacking, such as ways to change and reuse real devices, find hardware flaws, and make custom hardware solutions. We give you information on how to hack, improve, and protect hardware through in-depth guides, creative projects, and stories about new tools and technologies. Find out about the newest trends and changes in the world of hacking gear.

WIBattack – SIM Card Browser Bug let Hackers Take Control Over Mobile Phones to Make Calls & SMS

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it…

5 years ago

ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Skimmer: The threat on ATM fraud devices known as “insert skimmers,” these thin data theft tools made to be completely hidden inside…

6 years ago

Cisco Switches are Vulnerable to Remote Hack to Gain Full Control Over a Vulnerable Network – Open Port with 8.5 Million Devices

A Remote Code Execution flaw that affected the Cisco switches that allow an attacker to gain the full control of…

7 years ago