Future attacks ??

I liked the article on some remote attacks without network!!! Interesting…….

http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections

What about analyzing your brain waives..Hah.. Funny… 🙂

Advertisements

Phishing Attack – An amateur example

I got an email from some amateur hacker asking me to change my bank account details.

The email was quite promising, I liked it 🙂 Here is an screen shot of that from my mailbox :-

sc4

After i clicked th URL, the layout was good but the URL that was visible on address bar is really bad, I mean really amateur 🙂

Here is a screen shot of that. I have marked the mistakes 🙂

Screenshot-2

BIOS attack & cryptography

i liked the article on BIOS attack :- http://searchsecurity.techtarget.com.au/articles/33210-BIOS-can-become-a-source-of-malware.

The author sited two examples/ mechanism to prevent such attacks:

1) Non-writable BIOS, well it was before, but not user freindly.

2) Trusted Platform Module. This based on cryptographic verification and very secure. But there is problem of certificate expiration of public key cryptography. With current standard a certificate can be valid upto 2-3 years max and you can’t throw your PC after that period if you do not update your certificate store. Now that becomes more or you can say very complicated process. Atleast not so user friendly.