Monday, March 23rd, 2009
Apply all of the browser, application and OS patches you want, your machine still can be completely and silently compromised at the lowest level--without the use of any vulnerability.
That was the rather sobering message delivered by a pair of security researchers from Core Security Technologies in a talk at the ...
Posted in Hardware, Privacy, Security | No Comments
Saturday, March 21st, 2009
As promised, the paper and the proof of concept code has just been posted on the ITL website here.
A quote from the paper:
In this paper we have described practical exploitation of the CPU cache poisoning in order to read or write into (otherwise protected) SMRAM memory. We have implemented two ...
Posted in Coding, Hardware, Linux, Security, Windows | No Comments
Friday, March 20th, 2009
Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service.
The attack, posted online Thursday by researchers at Secure Science is an innocuous proof of concept that forces users to send out a predetermined twitter message, but it ...
Posted in Internet, Security | 1 Comment
Thursday, March 19th, 2009
I just saw that Wireshark has a version available for download to add it directly to your PortableApps Suite. This will allow you to carry a working copy of Wireshark around with you on a USB stick with all of your other portable applications.
First, grab the portable version of Wireshark ...
Posted in Internet, Networking, Privacy, Security, Windows | No Comments
Wednesday, March 18th, 2009
This is the scariest, stealthiest, and most dangerous rootkit I’ve seen come around since the legendary Blue Pill! No, I’m not just trying to sensationalize this or spread fear, uncertainty and doubt. This is serious and represents a massive new security threat for us all.
Security Researchers Joanna Rutkowska and Loic ...
Posted in Internet, Privacy, Security | No Comments