Trending

Researchers Hacked EV Car Chargers To Execute Arbitrary Code

EVs face significant cyber risks due to their reliance on interconnected systems and the increasing number of public charging stations, which often lack robust security measures.  Vulnerabilities in EV software and charging infrastructure can expose vehicles to malware, unauthorized access, and potential control by hackers. During Pwn2Own Automotive 2024 in Tokyo, cybersecurity researchers hacked  EV car chargers  to execute arbitrary code. Researchers Hacked EV Car Chargers At the Pwn2Own Automotive 2024 event, researchers exploited three EV chargers:-  Autel MaxiCharger (MAXI US AC W12-L-4G) ChargePoint Home Flex JuiceBox 40 Smart EV Charging Station  They executed arbitrary code via Bluetooth while focusing on the Autel MaxiCharger, and this uncovered the “CVE-2024-23958,” “CVE-2024-23959,” and “CVE-2024-23967”  vulnerabilities . The features of the charger include WiFi, Ethernet, Bluetooth, 4G LTE, RFID, LCD touchscreen, RS485, and a USB-C port. Its har...

Top Browsers for Security

                       In this cyber world, we would love to feel secured while surfing through internet from all kind of security concerns. To ensure this lets take a look at the secure browsers that needs to be used.
  1. TOR Browser                 
    If you’re looking for a browser that’s thought of everything security-wise, Tor Browser might be the browser for you. The Tor Browser handles your security concerns down to the smallest detail.
                Tor also offers other security measures such as the automatic deletion of your browser history and cookies when you’re finished browsing, the blocking of third-party trackers, and protection that includes three layers of encryption for your web traffic, “as it passes over the Tor network.”
  2.  Epic browser                    
                                                                                                                  Epic is built upon Chromium, the open-source project Google and others maintain. Google uses Chromium to provide the source code for its Chrome browser. Epic takes several steps to increase privacy by decreasing the amount of information the browser spills to the outside world.
    For example, while rivals have manually enabled modes that automatically delete all traces of browsing history — called "Incognito Mode" in Chrome and "Private Browsing" in Firefox — Epic runs only in such a mode. When a user closes Epic, swaths of otherwise-retained data is automatically deleted, including all cookies, all browsing history and all contents of the browser's cache.
  3. SRWare Iron Browser                                                                                                                                     
           The SRWare Iron is an interactive and easy to use freeware web browser. It is an implementation of the Chromium by the Germany firm SRWare. The major usage of this tool is to remove the various usage tracking and even other kind of privacy related functionalities which Google Chrome has got.                                                                                                    
  4. Comodo Dragon Browser                                                                                                                               
  Just like the Epic Privacy Browser, Comodo Dragon is based on the Chromium project. The browser includes all Chrome’s features but provides better security and privacy when browsing the web. So, if you are not a huge fan of Chrome and prefer Mozilla instead, you can choose Comodo Ice Dragon version as your most secure browser.
The main advantage of the browser are:

  • Domain Validation technology that identifies secure SSL certificates;
  • Blocks cookies and other tracking technologies;
  • Stops Browser download tracking.                                                                                                                
   Stay safe and keep exploiting :)                       
   

Comments

Popular posts from this blog

Ninjutsu OS- Windows based pentesting distribution

Fog Ransomware

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers