Covert channel are able to transfer information between processes that aren’t allowed to communicate as define by computer security policy. Transmission of information are often not transmitted through legitimate transfer mechanism. A recent published paper from Fraunhofer FKIE demonstrate a new way to transmit data through microphone and speaker on a normal laptop. Using inaudible sound
Watch Sophos bust three wireless security myths: Network name hiding and MAC address filtering is for safety, not for security. And never use WEP as your wireless encryption solution.
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught my attention. Being curious, I proceeded to ask her opinion on BackTrack 5 as I have yet to get my hands on those. It turns out that this was her first BackTrack and she was still exploring with the tools.
Earlier of the week, Larry Pesce, co-host of PaulDotCom and Senior Consultant at NWN Corporation, presented at SANS APAC Series on How Attackers Exploit Modern “Secure” Wireless Networks. As wireless networks security improves, with better encryption and authentication services, attackers have to change tactics from just simply exploiting WEP. Wireless attacks is not just cracking
WPA or WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the