USBHarpoon Is a BadUSB Attack with A Twist
avatar

Posted in News | Leave a comment

Cloud Product Accidentally Exposes Users’ TLS Certificate Private Keys
avatar

Posted in News | Leave a comment

Cloud Product Accidentally Exposes Users’ TLS Certificate Private Keys
avatar

Posted in News | Leave a comment

RFID Thief v2.0
avatar

This is an interesting project that shows you how you can create a long range RFID reader.  This is another reason why wireless, no matter how short the range, is insecure.

 

Source: RFID Thief v2.0 – scund00r

Posted in Hacks | Leave a comment

Containers are not VMs
avatar

I spend a good portion of my time at Docker talking to community members with varying degrees of familiarity with Docker and I sense a common theme: people’s natural response when first working with Docker is to try and frame it in terms of virtual machines. I can’t count the number of times I have heard Docker containers described as “lightweight VMs”. I get it because I did the exact same thing when I first started working with Docker. It’s easy to connect those dots as both technologies share some characteristics. Both are designed to provide an isolated environment in which to run an application. Additionally, in both cases that environment is represented as a binary artifact that can be moved between hosts. There may be other similarities, but to me these are the two biggies. The key is that the…

Source: Containers are not VMs

Posted in DevOps | Leave a comment