Saturday, January 10, 2015

Working in public places? Think again.

For decades remote capturing of the data (first from people or TV set talking, then from the working computer) was an effective way for political and business espionage. We saw methods to capture sounds, CRT emission, keyboard clicks etc. Tablets and low-power notebooks give much less information to outside world, yet the spies don't calm down and try to capture even tiny bits of electronic emissions hoping to grab your passwords or even more valuable information.

Though I am a bit skeptical about real-world use of these attacks, you still need to be careful when working with confidential information in public. It is also important to mention that rubber-hose cryptanalysis remains effective and if you have logged into your banking account and the attacker knows that you have a fortune in the bank, it makes sense for him to just grab your notebook and run.

Wednesday, April 23, 2014

The Urban Legend of Multipass Hard Disk Overwrite

It is "known" that to securely delete the data from the disk you need to write the data over the deleted blocks several times (different sources say from 3 to 35 times). But is this true?

The Urban Legend of Multipass Hard Disk Overwrite article will tell you what the state of things is as of now (well, of '2011).

The overall conclusion, I think, is "if you are paranoid, physical destruction of the disks is recommended".

Saturday, April 5, 2014

Internet of Things strikes back

The Internet Of Things is another big hype around the corner. Or ... right in your room already, if you have one of those consumer devices, which are silently powered by general-purpose (or wide-spread proprietary specialized) operating system like Linux or that Cisco OS that powers all their products. The devices include network appliances, smart (and some "dumb") TV sets, and also surveillance cameras and DVRs.

And all those "things" are part of Internet, either by incident (due to misconfigured and overly opened networks) or intentionally. 

What happens if the hacker finds a way to one of those things, is described in this article. In the article the malware (bitcoin miner) was silently installed over Telnet port opened by default (and properly not blocked on the nearest router/NAT). And the miner is a small evil, comparing to what can happen if hackers get to camera recorder, disable recording and then join some robbers to rob the protected house.

Wednesday, April 2, 2014

Important new security extension

There was a new security extension introduced in RFC 7169. Please check it for details.

Wednesday, January 15, 2014

Hardware attacks are still more effective

An attack was taken on victims computers, but in quite unusual way - by physically breaking into victims' room and installing spyware on their computers from the offline medium. This appeared to be much simpler, than trying to hack into the computer remotely.

More on