Reopening a cold boot case

Subject: General Tech | September 14, 2018 - 03:31 PM |
Tagged: security, Lenovo, dell, apple

Many, many moons ago a vulnerability was discovered which would let you grab some or all of the data last written to RAM.  A computer in sleep mode could be powered off, the firmware specifically modified and then booted from a USB drive, allowing an attacker to extract data from the RAM.  This requires physical access and a specific skill set but does not take all that long.  This new attack is used to grab the encryption keys from memory, which then allows them to gain access to the data stored on your encrypted drives.  The Inquirer reports that there is a solution to this resurrected vulnerability, however it is only easy to implement before a system is provided to customers, worrying for companies using these commonly deployed brands.

View Full Size

"But F-Secure principal security consultant Olle Segerdahl, along with other researchers from the security outfit, claim they've discovered a way to disable that safety measure and extract data using the ten-year-old cold boot attack method."

Here is some more Tech News from around the web:

Tech Talk

Source: The Inquirer

No comments posted yet.

Post new comment

The content of this field is kept private and will not be shown publicly.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd> <blockquote><p><br>
  • Web page addresses and e-mail addresses turn into links automatically.

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.