Thermal Camera Plus Machine Learning Reads Passwords Off Keyboard Keys

An age-old vulnerability of physical keypads is visibly worn keys. For example, a number pad with digits clearly worn from repeated use provides an attacker with a clear starting point. …read more Continue reading Thermal Camera Plus Machine Learning Reads Passwords Off Keyboard Keys

This Week in Security: Session Puzzling, Session Keys, and Speculation

Last week we briefly mentioned a vulnerability in the Papercut software, and more details and a proof of concept have been published. The vulnerability is one known as session puzzling. …read more Continue reading This Week in Security: Session Puzzling, Session Keys, and Speculation

This Week in Security: Spandex Tempest, Supply Chain Chain, and NTP

Microsoft’s Threat Intelligence group has announced a new naming scheme for threat actors. It sounds great, naming groups after weather phenomenon, based on the groups motivations or nation of origin. …read more Continue reading This Week in Security: Spandex Tempest, Supply Chain Chain, and NTP

This Week in Security: QueueJumper, JS VM2 Escape, and CAN Hacking

You may not be familiar with the Microsoft Message Queuing (MSMQ) service, a store and forward sort of inter-process and inter-system communication service. MSMQ has become something of a legacy …read more Continue reading This Week in Security: QueueJumper, JS VM2 Escape, and CAN Hacking

This Week in Security: Cookie Monster, CyberGhost, NEXX, and Dead Angles

“Operation Cookie Monster” ranks as one of the best code names in recent memory. And it’s apropo, given what exactly went down. Genesis Market was one of those marketplaces where …read more Continue reading This Week in Security: Cookie Monster, CyberGhost, NEXX, and Dead Angles