Remove 2021 Remove Authentication Remove Hardware Remove Operating Systems
article thumbnail

Technology Short Take 136

Scott Lowe

Welcome to Technology Short Take #136, the first Short Take of 2021! Servers/Hardware. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Want to enable logging in every AWS service that exists (as of 2021)? Operating Systems/Applications.

Linux 60
article thumbnail

Qualcomm’s new always-on smartphone camera is a potential privacy nightmare

The Verge

Modern smartphone operating systems now do a good job of telling you when an app is accessing your camera or microphone while you’re using the device, but it’s not clear how they’d be able to inform you of a rogue app tapping into the always-on camera. The OnePlus 7 Pro hid its entire camera system in a motorized pop-up module.

System 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Servers/Hardware. Operating Systems/Applications. The state of virtualization on Apple Silicon hardware has seen a few developments in recent days and weeks. network virtualization).

article thumbnail

Technology Short Take 117

Scott Lowe

Servers/Hardware. spec , expected in to land in 2021. Operating Systems/Applications. I take exception to the use of “application security” in David’s title, which I (personally) take to mean something more than mutual TLS (which is more about application identity and authentication/authorization).

Storage 60
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. When I started writing my first book when gadgets betray us, IoT was still known as hardware hacking, or embedded security.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. When I started writing my first book when gadgets betray us, IoT was still known as hardware hacking, or embedded security.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Jonathan Knudsen from Synopsys joins The Hacker Mind to discuss his presentation at SecTor 2021 on fuzzing message brokers such as RabbitMQ and VerneMQ, both written in Erlang, demonstrating that any type of software in any environment can still be vulnerable. Vamosi: So that is a problem.