Monthly Archives: March 2008
Feature or Flaw?
According to an article found at Dark Reading, Adam Boileau from Immunity Inc, has decided after two years to make publicly available his tool Winlockpwn that “lets an attacker take over a ‘locked’ Windows machine without even stealing its password” … Continue reading
Wireless Keyboards
With everything going wireless now, many people are cutting the cord and getting wireless keyboards and mice. However, not many people stop and think what might happen if these wireless peripherals are compromised. If say someone could spoof the identity … Continue reading
Security Review: Apple iPhone 3rd party application support
On Thursday, Apple happily unveiled its plan for third party support of native iPhone applications. The plan involves an application development and distribution pipeline including an iPhone SDK, a suite of IDE tools, and a sales and distribution plan through … Continue reading
The Goolag Scanner and Google Hacking
Bruce Schneier posted on his blog earlier in the week about a new, free, open source application by the “Cult of the Dead Cow” (cDc) called Goolag Scanner. It essentially automates a technique called Google Hacking, which was pioneered by … Continue reading
Security Review: Car Alarms
Summary Most people have probably heard a car alarm go off sometime in their life, and the chances are that it was a false positive are also pretty good. Usually cars that have an alarm have some sort of alarm … Continue reading
Current Event: Physicists Successfully Store and Retrieve Nothing
Despite the satirical title, teams of Physicists from the U. of Calgary and the Tokyo Institute of Technology recently published papers (and here) detailing their feat of storing a ‘squeezed vacuum’ by apparently reducing the amplitude of a quantum-mechanically interpreted … Continue reading
Hacking ATMs
ATMs are surprisingly easy to hack according to CNET. From a report on ATMs, up to 90 percent of the ATMs in the U.K. could be at risk for worms, denial-of-service attacks, getting customer data intercepted, and having money stolen … Continue reading
Cold Temperatures Compromise Encryption Security
Researchers at Princeton University have found a very interesting and different approach to bypassing encryption. It has been demonstrated that when dynamic random access memory (DRAM) is frozen to extremely low temperatures, it retains whatever data is currently loaded onto … Continue reading
[Collaborative] Chinese hackers: harmless scriptkiddies or a growing adversary?
CNN got an inside view of the so-called “Chinese cyber militia” when a group of three Chinese hackers agreed to be interviewed. This group of hackers claim that “no site is one hundred percent safe,” and that they’ve even broken … Continue reading
A little security humor
The Onion has posted quite a funny video taking advantage of the many security problems with the Diebold voting machines. Diebold Accidentally Leaks Results Of 2008 Election Early