Category: Hardware News
-
Behind the iPhone meltdown
One of the good things about long airport layovers are the chances you finally get to catch up on your reading. Which is what it finally took to crack open my last issue of Wired magazine. I must say I was quite amused to find an article outlining the love/hate relationship between AT&T and Apple.…
-
Keeping my Droid “G”
Freshly back from a new round of security based conferences I will take a moment to point out one of the more interesting topics for me this time around. The discussion on Cell Phone Spying (not that I made it inside the actual talk with the ungodly line). More specifically how by using a frequency…
-
RSA Discusses The Challenge of Securing RFID
RSA researcher Ari Juels sat down with SearchSecurity.com to discuss various topics. One of which was the constrained capabilities of RFID (like wireless bar codes), and how it affects the security posture needed to secure these devices. But, in fact, it’s possible to shoehorn in capabilities for which these tags were not explicitly designed. For…
-
The Death of the Guard?
Suffering the same fate as many other technology projects during our economic slowdown it appears the CommerceGuard project has had it operations suspended by GE. The CommerceGuard project was responsible for development of the CommerceGuard Container Security Device System (CSD) whose purpose was to track and secure shipment containers. The system was developed to meet…
-
Cisco PIX & ASA Multiple DoS, ACL Bypass, & Authentication Bypass Vulnerabilities (Bugtraq ID:34429)
Some fairly critical issues disclosed on a very popular security product. Cisco PIX Security Appliance and ASA 5500 Series Adaptive Security Appliance are prone to multiple denial-of-service vulnerabilities, an ACL-bypass vulnerability, and an authentication-bypass vulnerability. Read More Here … An attacker can use readily available network utilities to exploit these issues. The following example data…
-
New Category Added to SecurityPimp “LSYiPDT”
As an avid user of the Google Phone, and someone who LOVES the Android OS. We have added a new section to the site “LSYiPDT” or Let’s see your iPhone do this. Now it would be easy to point out the obvious tasks like run background apps, cut/paste, scan barcodes, last longer than 24hrs w/o…
-
Hack-A-Day: S-Video on your Atari 2600
Those cool guys at Hack-A-Day have a fun article on how to hack your old atari system to make it S-Video compatible thus making it actually usable without that old TV slider switch. I think this will be a good reference to perform a similar hack on my ancient Tandy PC that I really want…
-
Exploiting Intel CPU cache mechanism
Since I did not get out to Black Hat DC last month I was just reviewing the papers and came across one very interesting one. Aside from the white paper I also enjoy the story about the new “Friends” disclosing such an exploit brings. All in all a good read and just more wood for…
-
Interview with Charlie the man behind the pwn2own Macbook Hacks
During the PWN2OWN security competition the hacker best known for hacking the iPhone, discusses hacking fully patched Macbooks in under 2 min shares some information. Yes, I took down the Mac in under a minute each time. However, this doesn’t show the fact that I spent many days doing research and writing the exploit before…
-
Read a bedtime story by your Scanner?
Similar to the functions of the new Kindle device. A new high tech document scanner with OCR functions built in will not only scan documents or books for you but also reads them back to you. Now if only it could turn its own pages! Plustek Reader