Advertisement
more top stories »

Hack


— Automotive

Hackers remotely take over Jeep Cherokee

By - July 21, 2015 1 Picture

The minute you connect a car to the internet, you’re exposing it to the risk of hacking – and even if it’s only the entertainment system that’s supposed to be online, a skilled hacker can now remotely take control of just about any electronically controlled part of your car, including the steering, throttle and brakes. And this isn't some distant thing to worry about in the future. One Wired reporter just had the terrifying experience of having his Jeep Cherokee taken over by hackers while he was on the freeway. Like a scene in a horror movie, he found himself a helpless passenger in his car as he lost control of its functions one by one.

Read More
— Music

Lego steps into the groove at MidiHack 2014

By - May 23, 2014 7 Pictures
Lego. Is there anyone who doesn't love letting the creative juices flow to build everything from 3D printers to cars you can ride in to musical instruments? During the recent MidiHack weekend in Stockholm, Sweden, an unofficial collaboration between a university professor and three developers from Native Instruments yielded a rather impressive step sequencer, complete with XY pad, faders and rotary controls. Read More
— Electronics

Linux software engineer builds his own PiPhone

By - April 30, 2014 7 Pictures
Since its launch and slightly delayed shipping in 2012, we've seen Raspberry Pi computers used for everything from a bartender to robots to a bizarre musical instrument. Now dedicated tinkerer Dave Hunt has used a Model B to create a touchscreen smartphone called the PiPhone, though he readily admits that it would be easier and cheaper to pick up an (arguably much better looking) budget cellphone from a shop in the mall, "but hey, where’s the fun in that." Read More
— Music

Wooden cube converts touch into music

By - February 17, 2014 5 Pictures
The aim of the Hackable Instruments project is to create instruments that can be easily tweaked by the player to find interesting new directions for producing flavorsome tones, without any specialist knowledge of electronics or engineering, while also aiding in the development of distinctive playing styles. Project members Andrew McPherson and Victor Zappi have designed and built a deliberately simple instrument that produces sounds when a player's fingers touch, slide or tap a capacitive sensing strip on one of the wooden cube's faces. Read More
— Aircraft

SkyJack: The drone that hijacks other drones in mid-air

By - December 8, 2013 2 Pictures
Amazon's Prime Air announcement last week brought concerns about the use of commercial drones to the fore, but one programmer may have just muddied the waters even more. Notable hacker Samy Kamkar recently modified a Parrot AR.Drone 2 with his custom software, called SkyJack, allowing it to seek out the wireless signals of other UAVs and take control of them, even while in flight. Read More
— Health and Wellbeing

Patients' own heartbeat could work as anti-hacking password for implants

By - September 30, 2013 1 Picture
Remotely hacking a pacemaker or insulin pump should be impossible, but sadly it isn't. It puts the millions of people who use wireless medical implants at potential risk. Researchers at Rice University believe they have a solution: a touch-based device that will use a person's own heartbeat as a password to permit or deny access to their implant. Read More
— Telecommunications Feature

False sense of security: Your TV, car, neighborhood may be hackable

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year. Read More
— Telecommunications

CreepyDOL system can destroy your privacy for about US$500

By - August 6, 2013 2 Pictures
Brendan O'Connor is an unabashed hacker who has worked for DARPA and taught at the US military's cybersecurity school. CreepyDOL (Creepy Distributed Object Locator), his new personal tracking system, allows a user to track, locate, and break into an individual's smartphone. "For a few hundred dollars," he says, "I can track your every movement, activity, and interaction, until I find whatever it takes to blackmail you." Read More
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement

Subscribe to Gizmag's email newsletter

Advertisement