Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
I suppose this is possible…. Echo woke up due to a word in background conversation sounding like “Alexa.” Then, the subsequent conversation was heard as a “send message” request. At which point, Alexa said out loud “To whom?” At which point, the background conversation was interpreted as a name in the customers contact list. Alexa…
At the risk of coming across as a sales guy for the company I work for, I wanted to share a couple of resources that are available to learn more about mobile forensics. First, you can see the Mobile Phone Examiner (MPE) at work over at the AccessData YouTube channel here. Second, you can check…
Still, I think it’s clear that opening up the hiring process to people who don’t live in the immediate area creates a more diverse pool of talent to choose from. That we have to go out of our way to tell people that makes me question what companies are doing, or really care about, when they talk about being diverse.
Generative AI Could Reduce Law Firm Revenue by 23.5%– Interesting look at something that all industries using a billable hour model should be considering. More efficient work isn’t always profitable for you, which should raise larger questions.
When I saw a recent news story about Google Stadia, and the fact that other console makers, like Microsoft and Sony, are seriously considering moving to an all online gaming platform, and away from selling consoles, I immediately began to wonder how that would work with ISPs that have data caps and charges for using…
Yeah, I go back and forth all the time, and there a couple of things that I commonly forget, so I’m sharing this for all of us who have to go back and forth between a Mac and a PC because of our professional duties. Heck, this article is worth taking a look at just…
Like this:
LikeLoading...
One Comment
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
Subscribe to the weekly newsletterEvery new post, plus a lot more content about Careers and the Workplace, Mental Health at Work, eDiscovery, Privacy and Security delivered each week to your inbox!
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ