Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from the USB port.
The article lists some ways to protect your machine, but misses the big one in my opinion. Don’t let anyone get their hands on your computer. 😉
Saw it for myself this past weekend, the walkway that connects Terminal 4 to the Tom Bradley International Terminal at LAX. It’s really less than a 10 minute walk, and is so, so much nicer than either taking the Qantas bus if you’re connecting from American to Qantas, or having to actually exit the airport,…
“When you’re making an argument in the discovery context, know your data” This is such a great quote. I find it amazing how many times I hear of people showing up for meet and confers or sending responses to production requests who haven’t taken the time to understand the data that might be involved. It…
This is the idea behind Presntation.io, which I saw this post about this week. In a nutshell: Presentation.io does this by allowing the members of your audience to see your slides on their laptops, iPads, and Android tablets and watch them change when you advance your slides. This ensures that everyone is on the same…
Imagine if Gmail, Outlook, or Yahoo were incapable of grouping email conversations together. Without conversation grouping, or email threading, you might be able to sort by subject, but the software would not understand that “RE:” and “FW:” should be disregarded. The forwards would be in one group, the replies would all follow, and the original…
This is not a good look, and it’s reason #1 why we should be questioning the need to capture and store all of this data in the first place. It’s nearly impossible to keep it totally secured, but it also seems like they aren’t even trying that hard. “US Customs and Border Protection (CBP) has…
This is one of those statistics that should jump off the page and worry the heck out of people in HR, and especially the eDiscovery industry. “The study found that almost two-thirds (64 percent) of the respondents use their mobile devices for work-related communications — even though 32 percent of the respondents said they are…
Like this:
LikeLoading…
One Comment
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
RT @mikemac29: Linked – This $5 device can hack password-protected computers in just 30 seconds:
.. https://t.co/L5juXECOVZ