Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
This is true. People with mental health conditions often have episodes where they feel worse from time to time, much like MS or rheumatoid arthritis. When they return to work after a mental health leave, co-workers are often reluctant to talk to them, for fear of saying the wrong thing. It’s not uncommon to hear…
I don’t believe a lot of people understand this when it comes to BYOD situations: By the way, something else that the phone’s owner should understand: the extraction will not be limited to “relevant” text messages. Such refined extracting and searching is not possible with text messages – at least not yet. Rather, all information…
These tips are good. If you are setting up your own training room, I’d absolutely go through this list and make the room as easy as possible for the students. If you do customer training, however, many of these things may be out of your control. In 5 years of customer training, I have taught…
This isn’t a great statement on the security of sensitive data, and the last sentence isn’t a great statement in terms of the litigation readiness of organizations either. “Polling a little over a thousand IT professionals around the world, the survey found that 76 percent had reported that their companies had increased investments in perimeter…
It’s the rethink that some leaders are struggling with, isn’t it? “Council said company leaders need to be very aware of the high potential for disconnection among employees. “Many of the leaders have leveraged proximity, versus really thinking about how they lead, how they engage, how they create a culture, and how they maintain a…
Like this:
LikeLoading...
One Comment
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ