«
Expand/Collapse
43 items tagged "bank"
Related tags:
vulnerability [+],
sql injection [+],
mybb [+],
bank of america [+],
america [+],
sql [+],
access bank plc [+],
access [+],
zeus [+],
trojan [+],
plc [+],
card [+],
capacitor bank [+],
capacitor [+],
bank account [+],
account [+],
whitepaper [+],
steven j. murdoch tags [+],
smart card readers [+],
protocol [+],
misc [+],
hacks [+],
europe [+],
dos [+],
denial of service attack [+],
denial of service [+],
cryptographic protocol [+],
chip authentication [+],
chase [+],
chaos communication congress [+],
banking systems [+],
zeus trojan [+],
worm [+],
web [+],
variable [+],
users [+],
username parameter [+],
usa uk [+],
usa [+],
ukranian [+],
trusteer [+],
tricked [+],
transfer details [+],
transfer [+],
town [+],
sudden discharge [+],
steals [+],
steal [+],
sql query [+],
skyper [+],
self [+],
security [+],
scraps [+],
sale [+],
robin hood hacker [+],
robin hood [+],
released [+],
read [+],
plugin [+],
palms [+],
oscilloscope [+],
online [+],
offline [+],
norman [+],
news [+],
mobiles [+],
million [+],
malware [+],
logins [+],
leaks [+],
judge rules [+],
joins [+],
japanese bank [+],
japanese [+],
insider [+],
info [+],
household items [+],
heist [+],
hackers [+],
hacker [+],
gun [+],
german bank [+],
german [+],
freed [+],
firm [+],
farads [+],
factor authentication [+],
facebook [+],
european central bank [+],
european [+],
e mail address [+],
down [+],
digital storage [+],
denies [+],
day [+],
daniel eindhoven [+],
cyberthieves [+],
cvv [+],
credit cards [+],
credit [+],
crack [+],
coil gun [+],
chase bank [+],
charged [+],
central [+],
bitcoinica [+],
biometric [+],
bank transactions [+],
bank security [+],
bank robbery [+],
bank robberies [+],
bank of america web site [+],
bank information [+],
bank details [+],
bank card [+],
bank accounts [+],
bank account details [+],
aware [+],
authorities [+],
atms [+],
atm [+],
anatomy [+],
america web site [+],
aluminum plates [+],
account passwords [+],
accidentally [+]
-
-
16:00
»
SecuriTeam
The Bank v3 plugin for MyBB is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
-
-
14:01
»
Hack a Day
[Norman] put together a rather impressive 22,500 uFÂ capacitor bank. In addition to find things to torture with the strong magnetic field generated by a sudden discharge, he’d like to measure the current pushed from the device. He’s found a way to do this using a digital storage oscilloscope. To protect the oscilloscope [Norman] built his [...]
-
-
7:07
»
Hack a Day
Instructable user [EngineeringShock] got sick of buying batteries for his devices all the time and has instead opted to build himself a super capacitor bank that can be used to power common household items. His “forever” rechargeable capacitor bank is made of two large super capacitors rated at 400 farads apiece. It is charged through [...]
-
-
13:18
»
Hack a Day
[Daniel Eindhoven] put together this 11,344 Joule capacitor bank that he says would be perfect for weapons such as a rail gun, coil gun, or electrothermal-chemical gun. He machined a couple of aluminum plates to act as a positive and negative bus. The two are separated by a denuded sheet of PCB (making us wonder [...]
-
-
21:04
»
SecDocs
Authors:
Steven J. Murdoch Tags:
credit card bank Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer's debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous design errors, which could be exploited by criminals. Banks throughout Europe are now issuing hand-held smart card readers to their customers. These are used, along with the customer's bank card, for performing online banking transactions. In this talk I will describe how we reversed-engineered the cryptographic protocol used by these readers, using some custom-designed smart card analysis hardware. We discovered several flaws in this protocol, which could be exploited by criminals (and some already are). This talk will explain what vulnerabilities exist, and what the impact on customers could be.
-
21:04
»
SecDocs
Authors:
Steven J. Murdoch Tags:
credit card bank Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer's debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous design errors, which could be exploited by criminals. Banks throughout Europe are now issuing hand-held smart card readers to their customers. These are used, along with the customer's bank card, for performing online banking transactions. In this talk I will describe how we reversed-engineered the cryptographic protocol used by these readers, using some custom-designed smart card analysis hardware. We discovered several flaws in this protocol, which could be exploited by criminals (and some already are). This talk will explain what vulnerabilities exist, and what the impact on customers could be.