Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

How to make an ATM throw out all the money

How to make an ATM throw out all the money

An American expert on "breaking into" computer programs can "force" ATMs to throw out all their money. He presented his method at a conference in Las Vegas.

Criminals usually rob ATMs by setting up small cameras that 'read' customers' cards or, most simply, by breaking down walls and taking away ATMs.

However, hacker Barnaby Jack says that he spent two years working on how to rob an ATM smarter - to break into the ATM computer program.

He presented the results of his work at the Black Hat conference in Las Vegas, the annual gathering of computer program security experts.

His discovery is very important for banks around the world, which should now introduce new security measures.

Barnaby Jack says that the essence is that all ATMs from the same manufacturer have an identical key for the door behind which the computer's computer connection is. That is why it is easy to access the machine and its program and "order" it to throw out all the money.

Another principle of attacking ATMs, which was found by an American hacker, is based on the fact that the manufacturers of these machines do not use a password for their occasional Internet access to their computers. Thus, the ATM program can be accessed from a distance and the machine can be "ordered" to immediately withdraw all the money or to occasionally withdraw smaller, more difficult to notice amounts.

Barnaby Jack did not give details because, as he said, his goal is not to train someone on how it is done, but at the conference, he attracted a lot of attention from program security experts and upset the ATM manufacturers whose secrets he revealed.

Comments

Popular this month

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

When can we expect Street View from Serbia on the maps?

How did we get overwhelmed by the news that Google vehicles have arrived that are mapping the streets of cities and in our country, I believe you are wondering when we will be able to see our cities on the maps?

AI assistants - comparison for 2018

Personal assistants with artificial intelligence are improving more and faster as time goes on. We now have four leading AI assistants coming to us from four different companies. Of course, every company wants to have the best assistant, so tests are done to get ranking results.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

"Revive" ancestral photos with this free app

If a picture is worth a thousand words, how much is a video worth? So if the video lasts 10 seconds then it is worth 300,000 words considering that the video has 30 FPS. Now imagine having a video of your ancestor? You'd love it, wouldn't you? Well, if you have a picture of that person, you can make a video from just that one picture!