Today, all organizations must take care of security. Not all of them have the same amount of data to protect nor the same level of confidentiality but they have to implement a security policy. If it’s rather easy to implement a security perimeter to protect against the Evil Internet, internal
Category: Hardware
Fuzzing a Car Multimedia System?
Fuzzing is a new way to test the security of a system or an application by sending garbage or badly formated data. This attack may crash the target system or, in worst cases, produce unexpected results. In my new car, I’ve a complete multimedia system (GPS, radio, GSP, MP3, onboard
What About Confidentiality of Data in Repair Centers?
Bad day today… My iPhone died! Yesterday it was 100% functional and today refused to boot or charge!? No reaction event after a hard-reset and a few hours of charging… This irritates me at the highest level. Well! No alternative, I went to my local dealer and explained the problem.
iPhone Tethering Howto
In the long list of new features brought by the new iPhone firmware 3.0 comes “tethering” in my personal top-ten! What’s this? Tethering means a way to connect to the Internet from a device (usually a laptop computer using a mobile device as modem/router. More info are available on Wikipedia.
RSA Software Token for iPhone
Since the 6th of June, a great application is available (for free) in the AppStore. RSA released an iPhone version of its software token! I already spoke about strong authentication on this blog. To resume, strong authentication is achieved by mixing at least two different types of authentication methods from
When a Picture is Worth a Thousand Words
A security awareness is mandatory but can become quickly boring! Sometimes, a good picture is worth a thousand words. During a Google Image search, I found this one excellent! (Source: Minnesota States Colleges and Universities)
Strong Authentication with Linux
Next step in my investigations to implement a strong authentication process on my Linux laptop using the Yubikey. In a previous post, I explained how to use a Yubikey to authenticate on Linux with a PAM module. It works very well but, like I said in the previous article conclusion,
Yubikey Authentication on Linux
In a previous article, I presented the Yubikey product. I also explained why, for security reasons, the usage of two separate Yubikeys could be a plus. One converted to provide a static password and the second left as is (to provide one-time passwords). I received my 2nd Yubikey a few
Yubikey: One Time Password vs Static Password
I received my Yubikey a few days ago! Very good service from Yubico. Living in Belgium, the key was sent from Sweden (three business days to be delivered, tracking number, safely packed, etc). For those who never heard the word “Yubikey”, a small introduction. The Yubikey is a very simple
Fsck’ing OpenBSD File Systems on a Dedibox
Dedibox is a French collocation service part of the Iliad group. They rent dedicated servers at a very good price. In the standard offer, servers can be installed with standard operating systems: UNIX or Windows. “UNIX” includes all major distributions like Ubuntu, CentOS, Fedora, Slackware or Gentoo). I maintain my