Secret Storage Hides Encrypted Data In Plain Sight

Thursday, April 28th, 2011

A new data storage technique provides security, as well as plausible deniability. Whereas encrypted data can be easily spotted--if not necessarily decrypted, without obtaining the decryption keys from the device owner--the new technique disguises stored data as random disk fragmentation. When implemented correctly, a digital forensic investigator might not even ...

Block the Windows Shortcut Exploit

Monday, July 26th, 2010

The Windows Shortcut Exploit is a zero-day vulnerability in all versions of Windows that allows a Windows shortcut link to run a malicious DLL file. Sophos now has a free, easy-to-use tool blocks this exploit from running on your computer.Please note: Existing Sophos Endpoint customers are already protected from the ...

IronKey launches secure online banking USB stick

Wednesday, April 28th, 2010

IronKey has launched its Trusted Access for Banking USB stick at InfoSec 2010 in London. The IronKey TAB uses an isolated virtual machine launched from the stick and a intermediate server accessed through a VPN like connection to create a secure channel from the user to IronKey's servers, and from ...

Energizer DUO USB battery charger software allows unauthorized remote system access

Monday, March 8th, 2010

Energizer DUO is a USB battery charger. Included with the charger is a Windows application that allows the user to view the battery charging status. The installer for the Energizer DUO software places the file UsbCharger.dll in the application's directory and Arucer.dll in the Windows system32 directory. When the Energizer ...

My Data Backup Routine

Tuesday, January 12th, 2010

I wanted to offer my personal backup routine to all those that do not have something in place and not sure where or how to start.  I tried many different methods over the years and so far I think this is the best one for me, my amount of data, ...