hack.lu just started! The first talk was Malware of the future – When mathematics work for the dark side. To be honest, it was very hard in the morning! The speaker, Eric Filiol, flooded the audience with mathematical formulas. I didn’t practice maths for a while! But, and maybe the
Strong(er) Authentication
To perform strong authentication, you need to combine two or more of the following factors: Something you know (a password or PIN code), something you have (a token or a grid card), something you are (your finger print, voice or retina). By mixing those three factors, you can increase your
Don’t Trust Your (Wired) Keyboard Anymore!
Don’t trust your wire keyboard anymore! Computer keyboards, like other components generate electromagnetic waves. “Waves” means that they can be received by a third-party device and analyzed. It’s now done! Check out: Compromising Electromagnetic Emanations Of Wired Keyboards.
NIST: Two New Publications
NIST released two new documents: #1: FIPS Publication 180-3 Secure Hash Standard (SHS) has been released The National Institute of Standards and Technology (NIST) is pleased to announce the approval of Federal Information Processing Standard (FIPS) Publication 180-3, Secure Hash Standard (SHS), a revision of FIPS 180-2. The Federal Register
Do we have a CERT in Belgium?
A few weeks ago, there was some kind debate in Belgium about the need of a CERT (Computer Emergency Response Team). With the growing number of computers and networks incidents reported today, everybody agree to request the setup of a strong CERT infrastructure per country and managed by legal authorities!
BSDanywhere 4.3 is out!
It’s always useful to have a Live CD with us and much more if it’s a CD of my favourite UNIX flavor! BSDanywhere 4.3 is out!
0wN3d!
[Read on Korben’s Blog]
Asset Management Using Nmap
Nmap is probably the most known and used open source port scanner on the Internet. I’ll explain how to use this wonderful network toolbox to automate a simple asset management solution. “Know your network!” This is the main focus of this post. Today, having a global and up-to-date overview of
Hackers Only Responsible for 1% of Data Breaches
According to a study, only one percent of data breaches are caused by hackers! On first position of data breaches causes: negligent team members! Source: Data News.
NVidia GPU Used to Crack WPA(2) Keys
I found this article which speaks about a Russian firm which developed a tool to use NVidia GPU (up to four) to decrypt WPA or WPA2 encryption systems (bruteforce method). Here is the product: ElcomSoft Distributed Password Recovery. Conclusion? Wi-Fi protections are not sufficient enough to ensure confidentiality! Always use