Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
I’m trying out Open Office, which isn’t really a new thing for me, but the fact that I’m doing it at work is pretty new. It seems that our attempt to add two laptops to our pool of machines to be used at trial has hit one large roadblock. Namely, we can’t get them with…
Tim hits the nail on the head here, there’s a very fine line between trying to weed out “fake” information, and outright censorship. “Fake news is apparently everywhere. All over Europe, legislators and officials are trying to regulate content with “fake news” legislation and directives, as though the term could somehow be narrowly-defined enough that…
Earlier this week I had the pleasure of being invited to chat about backup strategies for consumers and small businesses with the hosts of the Every Day Cyber podcast
The bottom line? – Some backup is better than none. Multiple copies in various locations and states of being connected to the internet are better.
James isn’t pulling any punches in his claim that law schools aren’t teaching basic business skills. “This lack of basic financial literacy has been holding back the management and growth of the legal industry for decades. Many large law firms are only now starting to adopt the financial analytics tools that have long been commonplace…
Yes, all of these electronics not being disposed of properly are a risk to the environment, and it turns out that the data on them might be a risk to all of us as well.
Subscribe to the weekly newsletterEvery new post, plus a lot more content about Careers and the Workplace, Mental Health at Work, eDiscovery, Privacy and Security delivered each week to your inbox!
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ