Blog Stats
- 75,850 hits
Monthly Archives: November 2014
Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99
“With just a mobile phone we created a POS terminal that could read a card through a wallet,” explains Martin Emms, from the NewCastle University research team during the 2014 ACM CCS Conference held in the city of Scottsdale, Arizona, … Continue reading
Posted in Security Blog
Tagged 2014, contactless payment card, credit card, foreign currency, PCI Compliance, risk, visa
Comments Off on Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99
OS X 10.10 rootpipe
rootpipe, a privilege escalation vulnerability in OS X version 10.10, allows attackers to completely bypass logging in and gaining the highest administration privilege on a Mac. To protect against it, create a new admin user and remove the admin rights … Continue reading
Posted in Security Blog
Tagged 2014, mac, OS X, remote code execution, root pipe, rootpipe, vulnerability
Comments Off on OS X 10.10 rootpipe
AirHopper. Keylogging Disconnected Computers.
AirHopper demonstrates how textual and binary data can be ex-filtrated from physically an isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13 to 60 bps. Enough to steal a password. The technology works … Continue reading
Posted in Security Blog
Tagged 2014, airhopper, hacking, isolated, keylogging, mobile, no connection no problem, video display adapter radiation
Comments Off on AirHopper. Keylogging Disconnected Computers.