Monthly Archives: March 2009
Current Event – A Broader Look on Wireless Access Point Vulnerabilities
Wireless access points are a great technology – allowing a user the convenience of accessing the same wired network without wires. But the vulnerabilites and weak points that they produce can often be overlooked. Most people install these devices to … Continue reading
Current Event : Keyboard hacking (from thin air!)
A move over scanning the keyboard with infra-red cameras for heat signatures, listening to keystrokes and simple shoulder surfing. Say hello to hacking through thin air or electromagnetic waves, rather. Apparently, all keyboards generate unique electromagnetic waves for every single … Continue reading
Security Review: Urban Chicken Coops
Chicken coops form the heart of many urban farmers’ livelihoods. Providing sustenance directly through eggs, indirectly through fertilization of soil, and supplementing any waste management system through the digestion of otherwise unusable organic matter, the occupants of these structures play … Continue reading
Google’s Online Library
Google has been scanning whole books and archiving them since at least 2004. More recently, it settled a lawsuit that will allow it to legally copy copyrighted books and making them available online. Google allows users to search their book … Continue reading
Security Review: New Weapons in the Fight Against Doping
The use of performance enhancing drugs and medical techniques is a serious problem in every sport, but no sport is as notorious for doping scandals as is professional cycling. While Olympic athletes, baseball players, and body builders are often caught … Continue reading
Security Review: Helios Online Voting
The Technology The technology being evaluated is the Helios Online Voting Booth, usable at http://www.heliosvoting.org and outlined in the 2008 Usenix Secuirty paper available at the same site. The election system does not create novel cryptographic tools or algorithms, rather … Continue reading
Security Review: Online Taxes
For the last couple of years, I have done my taxes online. Compared to doing them by hand on paper, the online method takes far less time to fill out. However, it also brings with it the host of security … Continue reading
Security Review: Eye-Fi
Eye-Fi “The Eye-Fi Card stores photos & videos like a normal memory card. When you turn your camera on within range of a configured Wi-Fi network, it wirelessly transfers your photos & videos. To your computer. Or to your favorite … Continue reading
Security Review: Hollywood Awards Presentations
Big Hollywood parties have big time guest lists, so it’s no wonder that many people want to be there. These include both (mostly) benign fans and some people of the less benign variety. Hence, security at these events is a … Continue reading
Security Review: AI
Although thanks to Sarah Connor from The Terminator, 1997 wasn’t quite the day machines went out of control, autonomous systems become more and more integrated into our lives. Although AI might take many years to get developed to the level … Continue reading