USB peripherals can turn against their users

USB Controller Chips

Fingerprints are not fit for secure device unlocking

Latent print on sensor

Tests at OHM2013 confirm SIM vulnerabilities

SIM cards are prone to remote hacking

SIM card signature

Mobile networks differ widely in security, none protect well in all dimensions

Motorola C123

Payment terminals allow for remote PIN capture and card cloning

Payment_Terminal

Cryptographic problems are reduced to their true hardness by SAT solvers

Schrauben1.41

GSM cell phone calls use outdated encryption that can now be cracked with rainbow tables on a PC

Rainbow Table Hard Disk

Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny

Legic Prime RFID Tag

> Imprint , Subscribe: RSS Atom