The InfoSec Blog

The InfoSec Blog

System Integrity: Context Is Everything

  • About The Author
  • Master Index
  • Presentations
  • System Integrity

Another reason to have a policy not to eat at your desk

by antonaylward | Posted on 25 June, 201522 June, 2016

Hackers Can Use Pita Bread to Steal Laptop Encryption Keys, Say Researchers

Embedding such devices in something edible only means it will end up in the stomach of the targeted user. Perhaps that is intentional, but I suspect not.  Better to put the device in the base of the coffee cup.

 

Related Posts

  • This is not the IoT you want.This is not the IoT you want.
  • We’re mobile addicts but we just don’t want new smartphonesWe’re mobile addicts but we just don’t want new smartphones
  • Orwell: a quarter of a century lateOrwell: a quarter of a century late
  • His Bipolar made him do itHis Bipolar made him do it
  • TV kills!TV kills!
  • The 11 tiniest, most powerful computers your money can buyThe 11 tiniest, most powerful computers your money can buy

Related Posts:

  • Can We Secure the ‘Internet of Other People’s…
  • The Truth About Best Practices
  • Review: “Penetration with Perl” by Douglas…
  • Purpose unclear. Why are the FBI *really* trying to subvert…
  • Tracking kids via microchip ‘can’t be far…
  • On ‘paranoia’ – revisiting “Paid to…
Hardware Human Factors HumourGarfinkel Spafford Pita bread

About the author

Related Posts

May 15, 2012

If Customers Ask for More Choice, Don’t Listen

August 24, 2011

The real reasons for documentation – and how much

January 24, 2012

The Death of Antivirus Software

Leave a Reply Cancel reply

You must be logged in to post a comment.

Availability

I am currently available to offer InfoSec & GRC audit and consulting services through my company - System Integrity

Popular Pages

  • The Classical Risk Equation
  • Separation of Duties: Infosec, IT and Audit
  • “Cybercrime” is still Crime and “Cyberfraud” is still Fraud
  • Risk Analysis makes no sense … Does it?
  • Are *you* ready to give up yet?
  • Why InfoSec Positions go unfilled
  • Security
  • Risk
  • ISO27K
  • Rants and Raves

Categories

Archives

Calendar of Posts

June 2015
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
« May   Jul »

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Security Links

  • Schneier on Security
  • Gary Hinson
  • Martin McKeay
  • The Security Team
  • DHS Daily Report
  • SANS Security Alerts
  • Bruce Schneier
  • CERT-CC
  • MSDN- Security
  • Microsoft TechNet – Security
Copyright The InfoSec Blog. All rights reserved. | Powered by WordPress & Writers Blogily Theme