Crime

Dumb and Dumber

Dumb: ATM owners who use the default password for administering their ATM’s, allowing hackers to get into the machines easily by locating the default password online from vendor sites. Dumber: ATM owners who don’t change the default password after the…

MG
Matthew Greensmith
Podcast

GNC-2009-02-27 #455 On my way to Japan

On my way to Japan tomorrow morning, but dealing with a very sore back after a major fall here at home. Slightly worried about my connectivity in Japan but will keep you all advised if it looks like I will…

TC
Todd Cochrane
Podcast
Commerce, Crime, Dave's Muse, Information, Operating Systems, Security, Software, Technical

Hyper-Threading Vulnerability

Hyper-Threading technology, built into some Intel Pentium 4 central processing unit (CPU) microprocessors can be exploited by crackers and allow access to security keys. A description of the timing attack was presented Friday by a Colin Percival, a computer science researcher, at the BSDCan 2005 conference. Intel's Hyper-Threading (HT) algorithm enables Pentium CPUs to maximize the efficiency of the processing system. According to Intel's website, with HT technology "desktop users can experience greater system responsiveness and performance when multitasking. At home, users can encode audio and video at the same time, or run a virus scan in the background while continuing to play their favorite game. In the office, HT Technology enables IT managers to deploy PC services such as encryption, compression or backup technologies while minimizing the impact on PC user productivity. In addition, multitasking business workers can experience greater system responsiveness, enabling increased productivity. In summary, the Pentium 4 processor supporting HT Technology delivers a new level of performance and PC responsiveness for consumers and business professionals."

TC
Todd Cochrane