InvestorsHub Logo
Followers 5
Posts 2513
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Thursday, 09/13/2018 8:58:14 PM

Thursday, September 13, 2018 8:58:14 PM

Post# of 248726
Almost 'all modern computers' affected by cold boot attack, researchers warn

https://www.cnet.com/news/almost-all-modern-computers-affected-by-cold-boot-attack-researchers-warn/

Security researchers have discovered a flaw with nearly all modern computers that allow potential hackers to steal sensitive information from your locked devices.

The attack only takes about five minutes to pull off, if the hacker has physical access to the computer, F-Secure principal security consultant Olle Segerdahl said in a statement Thursday. Cold boot attacks can steal data on a computer's RAM, where sensitive information is briefly stored after a forced reboot.

These attacks have been known since 2008, and most computers today have a safety measure where it removes the data stored on RAM to prevent hackers from stealing sensitive information. It's also not a common threat for the average person, since both access to the computer and special tools -- like a program on a USB stick -- are needed to carry out the attack.

But Segerdahl and researchers from F-Secure said they've found a way to disable that safety measure and extract data using cold boot attacks.


"It takes some extra steps compared to the classic cold boot attack, but it's effective against all the modern laptops we've tested," he said in a statement.

There's no immediate fix available for the new vulnerability, F-Secure said. The cybersecurity company recommends that you configure your laptops to automatically shut down or hibernate instead of having it enter sleep mode when you close your screen.

The company said it's contacted Microsoft, Intel and Apple about its discovery. Intel didn't respond to a request for comment.

"This technique requires physical access. To protect sensitive info, at a minimum, we recommend using a device with a discreet Trusted Platform Module (TPM), disabling sleep/hibernation and configuring BitLocker with a Personal Identification Number (PIN)," Jeff Jones, a senior director at Microsoft, said in a statement.

Microsoft told ZDNet that it's updating its BitLocker guidance, while Apple said all devices using a T2 chip aren't affected.

F-Secure's researchers presented their findings at a conference in Sweden on Thursday, and are set to present it again at Microsoft's security conference on Sept. 27.
=================================================================
With Microsoft's recommendation to configure Bitlocker with the TPM, SED's with the TPM can't be far behind. imo. This should be a selling point for Wave and its management of at a minimum Bitlocker and probably SED's. imo.
=================================================================
https://www.wavesys.com/products/wave-self-encrypting-drive-management

No SEDs yet? No problem.

If your organization hasn’t yet deployed SEDs, you can skip the process of retro-fitting and simply incorporate SEDs on all new laptops as part of your regular refresh cycle. In the meantime, the same Wave console can manage BitLocker and SEDs, so you can protect the devices you have now with BitLocker and add those with SEDs as they are deployed. And if you’re using Wave’s cloud platform, you can also support OSX FileVault2

-more information at the link above



Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.