Posted on February 21, 2014 by Shopify API
Above: Thwarting Evil Maid Attacks , Eric Michaud and Ryan Lackey, 30c3.
Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond.
The attack addressed is an entire class of hardware, firmware, and software attacks around the attacker gaining surreptitious access and modification (of hardware/firmware/software) on one or more occasions, followed by the authorized user making normal use of the device after these modifications.
I had been leaving my own laptop in the safe of my hotel room each day; returning from meeting Greenwald I found the safe would no longer lock.
I ventured out the next morning. My laptop was in the unlocked safe. (It didn’t contain any secrets; merely a work in progress.) A tall American immediately accosted me. He suggested we go sightseeing. (…)
I declined the beer and dinner, later texting my wife: ‘The CIA sent someone to check me out. Their techniques as clumsy as Russians.” She replied: “Really? WTF?” I added: “God knows where they learn their spycraft.’
Posted in Evil Maid Attacks
Rift Recon tailors its clients from a suite of exclusive security service providers, in order to meet their specialized needs in software or hardware, utilities for cyber/physical security assessment, tool creation and team outfitting, as well as specialized trainings, and expert referrals.
Our team meets and verifies all equipment needs from solid standards to exotic tooling, and deftly handles client needs for cyber and physical security specialist placement.
Rift operates across a variety of security disciplines including product security, physical security, hardware/software research, and development (including middleware, electronic devices and kits). We also cater to professionals who are striving to meet their own clients’ various cyber and physical security needs.
Our client range spans independent trainers, corporations, to high net worth individuals. We consult red teams, independent cyber or physical security contractors, product security teams, and companies that require exacting, and/or executive-grade assessment reports.
Rift provides a suite of services.
Rift Recon excels at identifying and recruiting top-level talent, and holds a strong track record for meeting our clients’ unique physical security needs.
Discreet and methodical, Rift stands as the premiere company in the world positioned to expertly source, secure, or innovate and manufacture hardware to meet the exacting - often critical - software and hardware security needs of its clients.
Contact Rift Recon day or night for gear, consultations, to explore opportunities, or even just to find out more: email@example.com