Category Archives: Trusted Advisor

Hackable?” Tests Whether Car Key Fobs Are Secure

Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for your keys. But is the signal sent through the air secure? Does every click give hackers a chance to capture your code?

During the second season of “Hackable?” white-hat hacker Tim Martin gained keyless entry to Geoff’s rental car by intercepting the key fob’s signal. On the latest episode, Tim’s back, and this time we learn if he can also start the car and drive away. Listen and learn if your car’s key fob could help a hacker steal your car in under 60 seconds!

Listen now to the award-winning podcast “Hackable?”.

 

The post Hackable?” Tests Whether Car Key Fobs Are Secure appeared first on McAfee Blogs.

“Hackable?” Puts Wireless Mice to the Test

Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried about is running out of battery at the wrong moment. But do these devices actually have a critical vulnerability? Could cutting the cord allow a hacker to take control of your computer?
On the latest episode of “Hackable?” we investigate whether Geoff’s wireless mouse is susceptible and just what kind of damage penetration tester Tim Martin can do with something called a MouseJack keystroke injection attack. Listen and learn if your most sensitive data is at risk!
Listen now to the award-winning podcast “Hackable?”.

The post “Hackable?” Puts Wireless Mice to the Test appeared first on McAfee Blogs.

“Hackable?” Dedicates an Entire Episode to “Mr. Robot”

While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. Inspired by the efforts of the main character Elliot and his band of hackers, we’ve compromised Wi-FI networks, dropped malicious USB drives, and cracked car key fobs — all legally and with permission, of course. With the show’s final season set to air this fall, we want to pay tribute to our favorite show with a “Mr. Robot” spectacular. On the latest episode of “Hackable?” Pedro invites three white-hat hackers to Geoff’s office for attacks straight from past episodes of “Mr. Robot.”

Listen now to the award-winning podcast “Hackable?”.

The post “Hackable?” Dedicates an Entire Episode to “Mr. Robot” appeared first on McAfee Blogs.

Could a Dropped USB Drive Expose You to Malware?

USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer. So If you spot a USB drive sitting on the ground or in your office, should you assume someone lost their files? Or is it a hacker baiting you into compromising your computer and network?

On the latest episode of “Hackable?” Geoff learns if USB drives are dangerous and — with the help of white-hat hacker Tim Martin — sets his own trap for Pedro. Listen and learn how to protect your network from dropped drives, and if Pedro takes the bait.

Listen now to the award-winning podcast “Hackable?”.

The post Could a Dropped USB Drive Expose You to Malware? appeared first on McAfee Blogs.

Can Video Game “Mods” Expose Players to Malware?

“Hackable?” host Geoff Siskind’s son is a huge fan of the world-building computer game Minecraft — and downloads “mods” for it often. These mods are third-party updates that allow players to alter their favorite game. Whether you want to improve the graphics or add your favorite movie character to a game, there’s a mod for it. But are they safe to download? Do mods allow hackers to conceal malware that threatens your devices and data?

On the latest episode of “Hackable?” the team investigates if the mods Geoff’s son is downloading are putting his computer at risk. We invited white-hat hacker Tim Martin back on the show to create a Minecraft mod for Geoff. Listen and learn if Tim is able to hide dangerous code in a seemingly innocuous game update.

Listen now to the award-winning podcast “Hackable?”.

The post Can Video Game “Mods” Expose Players to Malware? appeared first on McAfee Blogs.

Can All-in-One Printers Be Hacked? “Hackable?” Sets the Fax Straight

The heyday of fax technology may have been in the 80s, but all-in-one printers found throughout homes and offices often still include a fax machine. And telephonic transmission has resisted the rise of email and other internet-connected messaging tools in a variety of fields, including healthcare and law enforcement.

On the latest episode of “Hackable?” we learn if this dated, but still used, technology puts entire networks at risk. Geoff invites two Israeli cybersecurity researchers to test the seldom-used fax machine and printer sitting in the corner of his home office. Listen and learn what they are able to do with only a $5 modem, Geoff’s fax number, and a Python script.

The post Can All-in-One Printers Be Hacked? “Hackable?” Sets the Fax Straight appeared first on McAfee Blogs.

Is Trouble Brewing for Owners of Smart Coffee Makers and Kettles?

There’s an undeniable appeal to a smart coffee maker that knows when you wake up so you’re never left without a freshly brewed pot. Or a smart tea kettle that heats water to the perfect temperature for brewing your favorite varietal. But does the convenience of automation put your personal data up for grabs? Could smart coffee makers and kettles actually leave you vulnerable to cybercrime?    

On the latest episode of “Hackable?” we answer these important questions about the proliferation of smart home devices — and settle the coffee vs tea debate once and for all with a hacking competition between two teams of white-hats. Listen and learn if there’s more trouble brewing for owners of smart coffee makers or tea kettles.   

Listen now to the award-winning podcast “Hackable?” 


The post Is Trouble Brewing for Owners of Smart Coffee Makers and Kettles? appeared first on McAfee Blogs.

“Hackable?” Puts Smartphones to the Test

Is the Personal Data on Your Smartphone Vulnerable? Listen to Find Out: Used for everything from banking and taking pictures, to navigating, streaming, and connecting, mobile devices are a treasure trove of sensitive personal data. On the latest episode of “Hackable?” the team investigates how secure that data really is by inviting a white-hat to try and remotely penetrate our host Geoff’s smartphone. Listen now on Apple Podcasts and learn if one errant click could expose everything, including your deleted photos.  

The post “Hackable?” Puts Smartphones to the Test appeared first on McAfee Blogs.