Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
Ultra Virus Killer – Malware Removal and System Repair Multi-Tool tags: Tech Security MM Posted from Diigo. The rest of my favorite links are here. Follow these topics: Uncategorized
When a Party Requests Native Files…. tags: MM LitSupport Marketing a Litigation Support / eDiscovery Department within a Law Firm: Getting New Customers, Part 4 tags: LitSupport MM Levels: Getting the Professional ‘Pop’ tags: Photography MM Maryland Law Firm Loses Medical Data tags: LitSupport MM Security Marketing a Litigation Support / eDiscovery Department within a…
While listening to a recent Typical Mac User Podcast episode, Victor’s wife made a comment about her iPhone that struck me as very interesting. Paraphrasing, she suggested that the iPhone’s internet access was very important to her, because when she’s at work the network has many of the things she needs to use to take…
“We are living in a world in which a handful of high-tech companies, sometimes working hand-in-hand with governments, are not only monitoring much of our activity, but are also invisibly controlling more and more of what we think, feel, do and say. The technology that now surrounds us is not just a harmless toy; it…
I saw a post by Jennifer Leggio today about locating network security folks on Twitter, and I wondered how many people who work in the legal technology field are using twitter or other social networking apps. In fact, following Jennifer on Twitter also helped me discover Twitterpaks, which is a wiki setup to encourage new…
So the problem is laid out pretty well in this statement: In a press release about the report, Monu Kalsi, vice-president of Shred-it, is quoted as saying, “The study’s findings clearly show that seemingly small habits [of employees] can pose great security risk and add up to large financial, reputational and legal risks.” And the…
Like this:
LikeLoading...
One Comment
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ