Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
How to Stop Google+ from Taking Over All of Your Google Apps tags: SocNetPres MM eDiscovery Project Management: Key Steps tags: LitSupport MM Traveling Thursday -Tipping Take Two Important detail about tipping when abroad tags: Travel MM How E-discovery Tools Can Help With Information Governance tags: LitSupport MM Announcing the 2013 Blawggie Awards – Tenth…
This is often the case with malware – Yet the attack could the been prevented by basic IT practices, the report says. As early as 2014, the Department of Health and the Cabinet had written to NHS trusts, saying it was essential they had “robust plans” to migrate away from old software. In March and…
Popular cloud storage firm Dropbox has been hacked, with over 68m users’ email addresses and passwords dumped on to the internet. The attack took place during 2012. At the time Dropbox reported a collection of user’s email addresses had been stolen. It did not report that passwords had been stolen as well. Go to Dropbox….
Tweetdeck pushed out an update today, in concert with the release of Tweetdeck for the iPhone. The reason for the desktop update is to add the sync feature that the iPhone version offered. So, now that Tweetdeck is offering cloud based sync, that post about moving Tweetdeck settings is about pointless. They solved that problem!…
These are all good, but this is one that I have seen time and time again. You can bring in an expert who says the same exact thing that someone has been saying for years internally, and suddenly it will seem like a great, new, idea. People get used to internal people hectoring them about…
Compare & Contrast: Self Collection Tools tags: LitSupport MM When Preservation Requests Are Wielded as Weapons tags: LitSupport MM Proof Finder: 1,000 Nuix licenses at $100 for charity tags: LitSupport MM Production is the “Ringo” of the eDiscovery Phases tags: LitSupport MM 5 ways to keep your rockstar employees happy tags: Management MM Navigating eDiscovery…
Like this:
LikeLoading...
One Comment
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ