Cold Boot Attack from 2008 Still Affects PCs and Macs

Computer criminals are constantly looking our for ways to infect computer systems at large. A recent security audit has revealed that hackers are using a 2008 cold boot attack which is still found in modern computers from all major vendors….Read more… Continue reading Cold Boot Attack from 2008 Still Affects PCs and Macs

New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs

Security researchers have revealed a new attack to steal passwords, encryption keys and other sensitive information stored on most modern computers, even those with full disk encryption.

The attack is a new variation of a traditional Cold Boot Attack,… Continue reading New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs

Is setting a firmware password on a Macbook enough to prevent cold boot attacks?

I have a Macbook configured with a firmware password required to boot from any media other than the built-in NVMe drive. In theory, this means without my password you can’t boot from removable media. Is this enough to prevent… Continue reading Is setting a firmware password on a Macbook enough to prevent cold boot attacks?

Are encryption keys wiped from RAM before hibernate, or how to do it (Luks and Truecrypt)

Using Linux, I have system and swap/hibernation partitions encrypted with LUKS, and data partitions encrypted with Truecrypt, and I am wondering when I put my laptop to hibernation if the encryption keys are wiped from the RAM before the c… Continue reading Are encryption keys wiped from RAM before hibernate, or how to do it (Luks and Truecrypt)

Are there volatile memory chips which dont retain data after power off?

It was demonstrated that dram modules can retain information up to 10 min after power off in certain conditions. My question – are there memory types which will retain data 10 sec at max even if being frozen (aka cold boot attack)?
EDIT. I… Continue reading Are there volatile memory chips which dont retain data after power off?