WiFi jamming via deauthentication packets
[Elliot] put together an intriguing proof-of-concept script that uses repeated deauthentication packet bursts to jam WiFi access points. From what we can tell it’s a new way to use an old tool....
View ArticleRunning Custom Code on Cheap One-time Password Tokens
One-time passwords (OTP) are often used in America but not so much in Europe. For our unfamiliar readers, OTP tokens like the one shown above generate passwords that are only valid for one login...
View ArticleSingLock Protects Your Valuables from Shy People
Two Cornell students have designed their own multi-factor authentication system. This system uses a PIN combined with a form of voice recognition to authenticate a user. Their system is not as simple...
View ArticleSecurity Problems with Gas Station Automated Tank Gauges
[HD Moore] recently posted an article on Rapid 7’s blog about an interesting security problem. They’ve been doing some research into the security of automated tank gauges (ATGs). These devices are used...
View ArticleYour Body is Your PIN with Bodyprint
[Christian Holz, Senaka Buthpitiya, and Marius Knaust] are researchers at Yahoo that have created a biometric solution for those unlucky folks that always forget their smartphone PIN codes. Bodyprint...
View ArticleBiometric Bracelet Electrifies You to Unlock Your Tablet
Researchers [Christian Holz] and [Marius Knaust] have come up with a cool new way to authenticate you to virtually any touchscreen device. This clever idea couples a biometric sensor and low-data-rate...
View ArticleTaking a U2F Hardware Key from Design to Production
Building a circuit from prototyping to printed circuit board assembly is within the reach of pretty much anyone with the will to get the job done. If that turns out to be something that everyone else...
View ArticlePractical IoT Cryptography on the Espressif ESP8266
The Espressif ESP8266 chipset makes three-dollar ‘Internet of Things’ development boards an economic reality. According to the popular automatic firmware-building site nodeMCU-builds, in the last 60...
View ArticleBiometric Authentication with a Cheap USB Hub
It’s fair to say that fingerprints aren’t necessarily the best idea for device authentication, after all, they’re kind of everywhere. But in some cases, such as a device that never leaves your home,...
View ArticleHeld Captive by Arduino and Multiple RFID Readers
If you’re the kind of person who has friends, and/or leaves the confines of the basement from time to time, we hear that these “Escape Rooms” are all the rage. Basically you get locked into a room with...
View ArticleFIDO2: The Dream Of Password-Free Authentication On The WWW
Of all the things which are annoying about the modern World Wide Web, the need to create and remember countless passwords is on the top of most people’s lists. From dozens of passwords for everything...
View Article
More Pages to Explore .....