RFID Thief v2.0
avatar

This is an interesting project that shows you how you can create a long range RFID reader.  This is another reason why wireless, no matter how short the range, is insecure.

 

Source: RFID Thief v2.0 – scund00r

Posted in Hacks | Leave a comment

Containers are not VMs
avatar

I spend a good portion of my time at Docker talking to community members with varying degrees of familiarity with Docker and I sense a common theme: people’s natural response when first working with Docker is to try and frame it in terms of virtual machines. I can’t count the number of times I have heard Docker containers described as “lightweight VMs”. I get it because I did the exact same thing when I first started working with Docker. It’s easy to connect those dots as both technologies share some characteristics. Both are designed to provide an isolated environment in which to run an application. Additionally, in both cases that environment is represented as a binary artifact that can be moved between hosts. There may be other similarities, but to me these are the two biggies. The key is that the…

Source: Containers are not VMs

Posted in DevOps | Leave a comment

The “world’s worst” smart padlock – it’s EVEN WORSE than we thought
avatar

The “world’s worst” smart padlock – it’s EVEN WORSE than we thought

https://nakedsecurity.sophos.com/2018/06/18/the-worlds-worst-smart-padlock-its-even-worse-than-we-thought/

Shared from my Google feed

Posted in News | Leave a comment

Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests
avatar

Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

https://search.app.goo.gl/ermYK

Shared from my Google feed

Posted in News | Leave a comment

#eFail: Major Vulnerability Exposes PGP Encrypted Email
avatar

#eFail: Major Vulnerability Exposes PGP Encrypted Email

https://search.app.goo.gl/KXozX

Shared from my Google feed

Posted in News | Leave a comment