Thursday, April 28th, 2011
A new data storage technique provides security, as well as plausible deniability. Whereas encrypted data can be easily spotted--if not necessarily decrypted, without obtaining the decryption keys from the device owner--the new technique disguises stored data as random disk fragmentation. When implemented correctly, a digital forensic investigator might not even ...
Posted in Hardware, Privacy, Security | No Comments
Monday, July 26th, 2010
The Windows Shortcut Exploit is a zero-day vulnerability in all versions of Windows that allows a Windows shortcut link to run a malicious DLL file. Sophos now has a free, easy-to-use tool blocks this exploit from running on your computer.Please note: Existing Sophos Endpoint customers are already protected from the ...
Posted in Hardware, Security, Windows | No Comments
Wednesday, April 28th, 2010
IronKey has launched its Trusted Access for Banking USB stick at InfoSec 2010 in London. The IronKey TAB uses an isolated virtual machine launched from the stick and a intermediate server accessed through a VPN like connection to create a secure channel from the user to IronKey's servers, and from ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Monday, March 8th, 2010
Energizer DUO is a USB battery charger. Included with the charger is a Windows application that allows the user to view the battery charging status. The installer for the Energizer DUO software places the file UsbCharger.dll in the application's directory and Arucer.dll in the Windows system32 directory. When the Energizer ...
Posted in General BS, Hardware, Internet, Privacy, Security | 2 Comments
Tuesday, January 12th, 2010
I wanted to offer my personal backup routine to all those that do not have something in place and not sure where or how to start. I tried many different methods over the years and so far I think this is the best one for me, my amount of data, ...
Posted in Hardware, Networking, Privacy, Security, Windows | 2 Comments