Author Archives: mccoyt
Virus laden hardware emerges
While the idea of software viruses is by no means new to those who work with computers, a new vector of attack seems to be developing in the form of hardware shipped from the manufacturer that is already infected with malware. … Continue reading
Security Review: Full disk encryption
Summary The past week has seen a renewed interest on the part of the security community in the reliability of hard disk encryption. With the recent revelation that data on encrypted drives is vulnerable to unauthorized access via memory manipulation, … Continue reading
Security Review: Cell Phone GPS
With the increasing popularity of auto-enabled GPS features in cell phones, a group at UC Berkeley is experimenting with using the phones as a means to gather real-time traffic information. The phones will broadcast their locations back to a central server … Continue reading
AT&T Investigating Copyrighted Material Network Filter
In one of the more interesting stories to come out of the telecom industry in recent weeks, the New York Times is reporting that AT&T is currently in the testing phases of developing a network filter that will monitor their … Continue reading
Security Review – The USPS Mailbox
Overview The blue USPS mailbox, a ubiquitous object on American streets today, is one of the most recognizable security devices currently in use. Despite its many shapes and sizes, its purpose boils down simply to one of protection of privacy, … Continue reading