Blog Stats
- 75,561 hits
Daily Archives: November 1, 2014
OS X 10.10 rootpipe
rootpipe, a privilege escalation vulnerability in OS X version 10.10, allows attackers to completely bypass logging in and gaining the highest administration privilege on a Mac. To protect against it, create a new admin user and remove the admin rights … Continue reading
Posted in Security Blog
Tagged 2014, mac, OS X, remote code execution, root pipe, rootpipe, vulnerability
Comments Off on OS X 10.10 rootpipe
AirHopper. Keylogging Disconnected Computers.
AirHopper demonstrates how textual and binary data can be ex-filtrated from physically an isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13 to 60 bps. Enough to steal a password. The technology works … Continue reading
Posted in Security Blog
Tagged 2014, airhopper, hacking, isolated, keylogging, mobile, no connection no problem, video display adapter radiation
Comments Off on AirHopper. Keylogging Disconnected Computers.