Hardware Archives | Hacked: Hacking Finance
Hacked: Hacking Finance

Hacked: Hacking Finance


Archives


Navigation
CategoryHardware
Featured

Cybersecurity

Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones

Posted on November 24th, 2016.

In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard....

Featured

Electronics

Chinese Physicists Achieve Record-Breaking Quantum Cryptography Breakthrough

Posted on November 4th, 2016.

Researchers at the University of Science and Technology of China and other Chinese labs, with the collaboration of a lab in the US, have implemented a secure quantum protocol known as Measurement-Device-Independent Quantum Key Distribution (MDIQKD), suitable for practical networks and devices, over a distance of 404 km. The breakthrough,...

Featured

Electronics

Dot: Precision Tracking Hardware Makes Your Smartphones Smarter

Posted on September 24th, 2016.

A team of five Berkeley engineers has developed a new hardware product that utilizes precision location tracking to make smartphone notifications highly intelligent and contextual. In the technology-minded world that we live in it’s nearly impossible to walk down the street without encountering someone on their phone. However, with the...

Featured

Cybersecurity

This “USB Killer” Drive Will Fry Your Gadget

Posted on September 12th, 2016.

Hong Kong-based company USB Killer believes that “any public facing USB port should be considered an attack vector.”

Featured

Cybersecurity

Antivirus Scan Stalls Heart Procedure for a Full 5 Minutes

Posted on May 16th, 2016.

A crucial medical device crashed during a heart procedure due to an antivirus scan that managed to crash the equipment, requiring doctors to perform a reboot of the computer entirely. An antivirus software installed on a PC led to an untimely crash during a heart procedure, causing doctors to reboot the computer, disrupting the procedure...

Featured

Cybersecurity

Seamless Security? LG Develops an Invisible Fingerprint Censor

Posted on May 2nd, 2016.

Fingerprint censors are all the rage in mobile phones these days, with the feature becoming common even in cheaper and more affordable mobile devices. In a leap for the technology that enables personal cybersecurity, LG has announced a fingerprint censor that resides under a phone screen’s glass. LG’s components subsidiary, LG Innotek,...

Featured

Cybersecurity

FBI Paid Hackers Over $1.3 Million to Hack iPhone

Posted on April 22nd, 2016.

The iPhone belonging to one of the San Bernardino shooters has been at the center of stand-off between the FBI and Apple in recent times. While Apple stuck to its no-backdoor policy, the FBI eventually recruited the help of grey-hat hackers to crack the iPhone. The cost for such a hack-job? Over $1.3 million. The highest ever publicly...

Featured

Breaches

FBI: Newfound iPhone Unlocking Technique Won’t Work On Newer Devices

Posted on April 8th, 2016.

The technique the FBI used to unlock an Apple iPhone used in the San Bernardino, Calif. terror attack cannot be used on new devices, FBI Director James Comey told students at Kenyon College in Ohio recently, according to AppleInsider.com. Comey did not reveal the process the FBI used to unlock the phone, but he said it would not work on...

Featured

Business

Samsung Will Make Qualcomm Snapdragon 820 Chips With Enhanced Malware Detection

Posted on January 14th, 2016.

Samsung Electronics will make the Qualcomm Snapdragon 820 mobile processors, raising speculation the chips could find their way into the South Korean giant’s smartphones, according to Computerworld.com. Samsung has begun producing logic chips using the 14-nonometer Low-Power Plus (LPP) process that it also uses for its Exynos 8 Octa...

Featured

Companies

Video: Drone Firm Raises Millions via Kickstarter, Then Rage Quits

Posted on November 25th, 2015.

Kickstarter projects and their woes are the subject of more than one website. While most focus on Kickstarter projects that fail to launch, there is another aspect of Kickstarter which doesn’t get enough attention and probably should: the projects which get funded and then never deliver a product. In this instance, the product is a...

Featured

Hardware

You Don’t Really Own Your Hardware: The War on Electronics Repair

Posted on November 25th, 2015.

The ways that companies like Apple try to extract more cash from their customer base are many. The notion of planned obsolescence is defined by the Oxford dictionary like so: A policy of producing consumer goods that rapidly become obsolete and so require replacing, achieved by frequent changes in design, termination of the supply of...

Featured

Cybersecurity

Get A Glimpse Of The Cyber Threat Landscape For 2016 And Beyond

Posted on November 12th, 2015.

Cybercriminals won’t be letting up their attacks on hardware and firmware in 2016, and the security industry will be working harder to meet the growing challenge. According to the recently released McAfee Labs Threat Predictions Report, threats will expand to virtual machines, wearables, and other surfaces. The report explores...

Featured

Cybersecurity

TrustedSec Releases TAP – An Open Source Attack Platform

Posted on October 29th, 2015.

Security professionals are often on the lookout for new tools. A variety of such is always a good thing, and you never really can have too many. Often enough, the best security professionals end up developing their own tools to fill needs that were never met by anyone else. This is somewhat the logic behind the new “TAP”...

Featured

Communication

Department of Justice Still Determined to Force Apple to Decrypt Its Consumer Technology

Posted on October 24th, 2015.

A methamphetamine distribution case in the District Court for the Eastern District of New York has the government trying a new approach in its fight against strong cryptography. Prosecutors believe there is strong evidence on an iPhone 5s belonging to an alleged drug dealer. They requested and were granted a warrant that a warrant be...

Featured

Cybersecurity

Snowden: Cisco Routers a Pakistani National Security Risk

Posted on October 7th, 2015.

British GHCQ used hacked Cisco routers to spy on Pakistan, according to NSA whistleblower Edward Snowden. The purpose of the router exploits was to help identify Middle Eastern terrorists operating in Pakistan. The UK government did not provide comment on Snowden’s claims.  Cisco routers have been known to ship with bugs in the...

Featured

Energy

Art Inspires Lighter, Simpler Sun-Chasing Solar Panels

Posted on September 9th, 2015.

Leaving bulky and motorized sun trackers behind, researchers at the University of Michigan come up with a newer, more convenient and less cumbersome way to get solar cells to bask in the sun while chasing sunlight. The researchers’ findings are available in an openly available paper titled ‘Dynamic kirigami structures for integrated...

Featured

Hardware

A Crash-Proof File System for Your Computer May Soon Be a Reality

Posted on August 24th, 2015.

MIT researchers will soon present the first computer file system that is guaranteed to remain uncorrupted and retain data during a crash, potentially changing modern day computer file systems for the better, the MIT news office revealed. The file system is a fundamental part of any operating system in a computer that helps write data to...

Featured

Hardware

Researchers Find a Novel Way to Potentially Double Solar Cell Efficiency

Posted on August 18th, 2015.

Researchers looking into new and sustainable energy have achieved a breakthrough in solar cell technology by reporting the development of a “green antenna” to potentially double the efficiencies of certain solar cells and significantly, make them more affordable. Solar energy is a proven, inexhaustible source of energy and is slowly...

Featured

Bugs

Vehicles Hacked Through Text Messages

Posted on August 13th, 2015.

As per reported by Engadget, the researchers from the University of California at San Diego claim to have a technique by which they can wirelessly hack into thousands of vehicles. By sending SMS messages to a dongle, a 2-inch device that plugs into the dashboards of many cars and trucks, used to track speed and location, researchers are...

Featured

Business

New Acer Windows 10 Laptops to Compete With Chromebooks

Posted on August 6th, 2015.

Windows 10 is not looking to be Microsoft’s flagship money maker, but rather its reintroduction into a market which now abounds with viable competitors. When the company rose to prominence throughout the 90s, it did not struggle with a great deal of competition. Apple had reached a standstill and would only truly resume its rise...

The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com.
P.H. Madore
ICO Analyst
P. H. Madore lives in Arkansas with his wife and children. He has covered the cryptocurrency beat over the course of hundreds of articles for Hacked’s sister site, CryptoCoinsNews, as Read More
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Justin O’Connell
Journalist
Justin O’Connell is a cryptocurrency journalist who works have appeared in the U.S.’s third largest weekly, the San Diego Reader & VICE.
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com.
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com.
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More