Posted on Monday, September 29th, 2014 by Ken Munro.
This hack demo shows you how easy it can be to bypass the login mechanism on Apple machines, and what you can do about it. Video Transcript ▾ Hello, and welcome to the Security Kitchen. My name is Ken and today we’ll be looking at FireWire and a tool called Inception that’s used for getting […] Read More
Posted on Thursday, September 25th, 2014 by Jamie Riden.
A quick update on the bug that everyone is calling shellshock, or bash apocalypse, or more boringly, CVE-2014-6271. The short version is that it may render your Linux box (or embedded appliance running Linux, or other UNIX if you’ve got bash installed) vulnerable to remote code execution. Whether it is vulnerable depends on a number […] Read More
Posted on Wednesday, September 24th, 2014 by Tom Roberts.
I regularly get to order all sorts of strange things from Amazon. This is because it’s a social engineer’s one stop shop! You can get keyloggers (for child monitoring of course), room bugging equipment (to keep watch on your suspect nanny), and hidden cameras in all shapes and sizes. Most social engineers know all about […] Read More
<< Older posts