Security

The YETI Is No Myth

Few things in this world possess the security that an apelike creature from the Himalayan region provides. Yet, if you can’t find the abominable snowman you can always name your portable security device after it. The difference? This yeti is no myth and it just might save your hide when everything goes SNAFU. Enter the YETI Portable Security System YT-100. ...

Read More »

Pentagon Hack Attack

Duck for cover! The Pentagon has been the victim of a cyber attack! The weapon in question is a hybrid computer worm rapidly spreading throughout the Pentagon’s thousands of interconnected defense computer networks. No worries, though. The Department of Defense has taken steps to slowing the worm’s advancement by quarantining networks and systems until its removal. Though the entry point ...

Read More »

Use Your Phone To Control Your Door Locks

If you’ve ever lost your keys while out on the town, you know there’s no way in hell you’re getting them back. Luckily, we tend to clutch our cellphones dear to our heart, never letting them out of our site. If you have a Schlage LiNK system, you need not worry about having keys anymore. Essentially, the LiNK system uses ...

Read More »

Sniffing Keystrokes By Monitoring Magnetic Field

Two doctoral students, Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne, have discovered a potential threat to security that declares keyboards “unsafe to transmit sensitive information”. By monitoring signals produced by keystrokes, the researchers were able to reproduce what had been typed on 11 different keyboards using a variety ...

Read More »

RFID Passports: Are They Secure?

Need even more proof that RFID doesn’t improve security? According to a group of hackers who bypassed an ePassport RFID authentication at an Amsterdam airport, RFID passports aren’t as secure as people think. Using software to design custom identities as well as convincing scanners to accept fabricated RFID chips, the hackers got around security without raising suspicion. They used an ...

Read More »

The Virus In Space

Get your mind out of the gutter, friend! I wasn’t referring to the terrible diarrhea the crew of the ISS got a hold of. To be quite honest, I’m talking about a nasty little worm for Windows that NASA somehow happened to miss. The infection, known as W32.TGammima.AG, can steal passwords and fuck up your system – something you don’t ...

Read More »

What’s That Noise? Just My Kid Drowning

Not every kid can swim like Michael Phelps, though every kid ought to. Parents, we understand. Sometimes you just don’t feel like sitting around watching the kids splash the water from the safety of dry land. After all, if they aren’t winning Olympic gold, what’s the point? That’s exactly why you bought the Safety Turtle Wireless Pool Security System for ...

Read More »

Defcon Mystery Challenge

Looks like Defcon 16 is one of the best yet. The “Defcon 16 Mystery Challenge” is a competition for attendees to have at. Solve a series of puzzles and mysteries and you could win special black Defcon badges that give you free admittance for life. One of the puzzles includes this delightful yellow ball with a combination lock on the ...

Read More »

Freedom Stick Could Cause The Opposite

Going to Beijing for the upcoming Olympic games? Well, if you weren’t aware, China is not a democracy. Their nation-wide firewall leaves access to certain websites blocked, dulling your internet experience. No worries, thanks to Germany’s Chaos Computer Club’s USB dongle dubbed The Freedom Stick. For just $30, this device is preloaded with software which will secure your connection, routing ...

Read More »

Three French Journalists Tossed From Black Hat ’08

We’re not actively covering the Black Hat 2008 security conference currently going on in Las Vegas but there is some crazy stuff happening. Similar to when I attended Defcon years ago with Hack a Day, there was a Wall of Sheep. The WoS displays people who got hacked and insecure connections to prove a point and expose weaknesses in wireless ...

Read More »