UK Police hack into government

Showing that the government in the UK is not above the law, Scotland Yard has hacked into government computers following suspicions that the government was not exactly forthcoming with evidence into one of their investigations. It gives me a nice, cuddly feeling, knowing that the two parties get to check up on each other.

Fairuse4wm

If you want to piss of Microsoft, you endanger their DRM system, which protects its connections to content suppliers. FairUse4WM strips DRM off media files allowing you to do what you like with the files you paid for. It’s now at version 1.2 and looks like it’s going to keep ahead of Microsoft. You can Read more about Fairuse4wm[…]

The liquid plot

Here’s a chemist’s take on the plausibility of the London liquid bomb plot, followed by commentary on what he calls Potemkin security. He references Schneier, and goes on about the practicality of security against these kind of plots (as almost everything can be impregnated with nitrates, such as clothing) and the practicality of guarding against Read more about The liquid plot[…]

Lock picking through bumping

Apparently this method is easier than picking or using a picking gun. You take keys and file them down to the minimum, hit them on the back after insertion and turn the lock. With a bit of practice this allows you to open locks within 30 seconds. (pdf link)

USB hacking

A seriously elegant way to hack someone’s network: drop USB sticks containing a trojan on the target’s parking lot and wait for the mail to come in.

Contactless ignitions

Can be broken through a laptop with WiFi within 20 minutes allowing people to do a clean steal of the car. A bit like when they had IR car fobs which could be saved using a palm and then replayed, but now you have to break the encryption.

RFID virusses

PCs have virusses, Macs have virusses, PDAs and cellphones have virusses, so why should RFID chips be any different? A working proof of concept has been made which is put onto an RFID chip, which infects the backend database and then transmits to other RFID chips that connect to that database.