Kiosk Hacking: When there is nothing else left

Monday, April 7th, 2008

In the tiger team operations we have been involved with, I often end up hacking through the least interesting systems. If you ask AP, a password-cracking ninja and master of hacking through simplicity, the less interesting the system is, the higher the chances to be insecure. A successful exploitation of ...

Biometric Hacking Tool Debuts

Wednesday, April 2nd, 2008

A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change. Matthew Lewis, of London-based Information Risk Management, demonstrated a proof-of-concept biologger last week at Black Hat Amsterdam and released the tool's source ...

USB malware on the rise

Wednesday, April 2nd, 2008

Around a tenth of all malware is designed to use portable storage media, such as removable USB drives, as an attack and spread vector. Security firm ESET said that 10.3 per cent of malware detections last month were identified as files containing information on programs to be run automatically when removable ...

Build The Ultimate Quad-Core Desktop With Intel’s QX9770

Wednesday, April 2nd, 2008

Intel has quietly begun shipping its hottest quad core desktop processor ever, the Core 2 Extreme QX9770. We built a PC, to see just how fast the 3.2-GHz, 45-nm chip, complete with a 1600-MHz front-side bus, really is. Our previous project, where we put together a system last fall with Intel's ...

Intel’s Atom processor unveiled

Wednesday, April 2nd, 2008

The trend toward ever smaller and cheaper PC components is, of course, nothing new. Chips have shrunk and prices have fallen for over 30 years now. Yet that trend has accelerated dramatically in recent years, spurred onward by the rise of mobile computing and signified by the success of low-cost ...