Monday, April 7th, 2008
In the tiger team operations we have been involved with, I often end up hacking through the least interesting systems. If you ask AP, a password-cracking ninja and master of hacking through simplicity, the less interesting the system is, the higher the chances to be insecure. A successful exploitation of ...
Posted in Hardware, Security, Software | No Comments
Wednesday, April 2nd, 2008
A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change.
Matthew Lewis, of London-based Information Risk Management, demonstrated a proof-of-concept biologger last week at Black Hat Amsterdam and released the tool's source ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
Around a tenth of all malware is designed to use portable storage media, such as removable USB drives, as an attack and spread vector.
Security firm ESET said that 10.3 per cent of malware detections last month were identified as files containing information on programs to be run automatically when removable ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
Intel has quietly begun shipping its hottest quad core desktop processor ever, the Core 2 Extreme QX9770. We built a PC, to see just how fast the 3.2-GHz, 45-nm chip, complete with a 1600-MHz front-side bus, really is.
Our previous project, where we put together a system last fall with Intel's ...
Posted in Gaming, Hardware | No Comments
Wednesday, April 2nd, 2008
The trend toward ever smaller and cheaper PC components is, of course, nothing new. Chips have shrunk and prices have fallen for over 30 years now. Yet that trend has accelerated dramatically in recent years, spurred onward by the rise of mobile computing and signified by the success of low-cost ...
Posted in Gaming, Hardware | No Comments