Tag: physical security
-
Schneier on Security: YubiKey Side-Channel Attack
Source URL: https://www.schneier.com/blog/archives/2024/09/yubikey-side-channel-attack.html Source: Schneier on Security Title: YubiKey Side-Channel Attack Feedly Summary: There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece…
-
Hacker News: How to verify boot firmware integrity if you prioritize neutralizing Intel ME?
Source URL: https://news.ycombinator.com/item?id=41349589 Source: Hacker News Title: How to verify boot firmware integrity if you prioritize neutralizing Intel ME? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses methods for protecting computer boot firmware, highlighting the trade-offs between using Intel’s me_cleaner and Trusted Platform Module (TPM) technology, as well as various strategies…
-
The Register: Watchdog warns FBI is sloppy on secure data storage and destruction
Source URL: https://www.theregister.com/2024/08/26/fbi_data_security/ Source: The Register Title: Watchdog warns FBI is sloppy on secure data storage and destruction Feedly Summary: National security data up for grabs, Office of the Inspector General finds The FBI has made serious slip-ups in how it processes and destroys electronic storage media seized as part of investigations, according to an…