I got my new corporate laptop today, a Dell Latitude E6500, very nice computer. Working as a security consultant, I’m always on the road, connecting my laptop on customers or evil (free Wi-Fi access point or conference) networks . Fortunately, my company allows consultants, if they want, to manage their
Category: Hardware
JanusVA: Hardware Privacy Adapter
According to their website, JanusVM is … “a software that allows you to surf the Internet without oppression or censorship, while protecting your privacy, security, and identity. It has advanced filtering capabilities for modifying web page content, managing cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet
Safe File Eraser on Linux
Working as a security consultant, my laptop contains a lot of confidential data: corporate data (emails, procedures, contacts list, etc) and, even more critical, temporary customers data (reports, documentations, network topologies, packet captures, etc ). That’s why data protection is a key point for me. First, data are encrypted using
USB Key Remote Destruction
Ironkey is known to distribute very secure USB flash drives. Physically protected by a rugged metal case, they are water-proof and tamper resistant. Data protection is based on a builtin crypto chip (via AES). They announced a few days ago a new service: “IRONKEY INTRODUCES SILVER BULLET SERVICE TO ENABLE
Stuck Payment Terminal
I’ll not trust this terminal anymore! (Picture taken in the Louvain-La-Neuve shopping center last Friday) Fail!
Ubuntu on Medion Akoya e1210
Yesterday, I bought a new toy. There was a special offer in Aldi shops: A mini-notebook Media Akoya. The announced price was 399€. Arrived on site earlier (to avoid retired people waiting in front of the doors), it was available for 369€ but with a 80GB disk. Once at home,
hack.lu Part #1
hack.lu just started! The first talk was Malware of the future – When mathematics work for the dark side. To be honest, it was very hard in the morning! The speaker, Eric Filiol, flooded the audience with mathematical formulas. I didn’t practice maths for a while! But, and maybe the
Strong(er) Authentication
To perform strong authentication, you need to combine two or more of the following factors: Something you know (a password or PIN code), something you have (a token or a grid card), something you are (your finger print, voice or retina). By mixing those three factors, you can increase your
Don’t Trust Your (Wired) Keyboard Anymore!
Don’t trust your wire keyboard anymore! Computer keyboards, like other components generate electromagnetic waves. “Waves” means that they can be received by a third-party device and analyzed. It’s now done! Check out: Compromising Electromagnetic Emanations Of Wired Keyboards.
NVidia GPU Used to Crack WPA(2) Keys
I found this article which speaks about a Russian firm which developed a tool to use NVidia GPU (up to four) to decrypt WPA or WPA2 encryption systems (bruteforce method). Here is the product: ElcomSoft Distributed Password Recovery. Conclusion? Wi-Fi protections are not sufficient enough to ensure confidentiality! Always use