Thin Client Customization

The Raspberry Pi is a single computer board, developed for Internet of Things (IoT) projects. The low cost, numerous connectivity options, and 'plug and play' nature of Pi makes for a board that is ideal for all. Pi is the perfect tool; you can use it as a desktop computer, media center, server, monitoring/security device, or any other custom application. We can compile any Linux-based Operating System (OS) to run on the versatile Raspberry Pi. Unlock the potential of the Raspberry Pi with plenty of access to development software and configuration options.

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

UEFI Bootkit Targeting Organizations

A Chinese hacking group used a rare UEFI bootkit called MosaicRegressor to target organizations and diplomatic missions for two years according to Kaspersky. UEFI initiates the boot sequence in a PC and loads the device's operating system. By exploiting this feature, the MosaicRegressor framework takes over the booting process. The group modified the firmware in order to deploy malicious code that will be run after the operating system is loaded. Since the firmware is typically shipped wi ...

CISA Issues Alert After Observing Surge in LokiBot Activity

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued an alert after observing a surge in LokiBot activity over the past two months. LokiBot first appeared in 2015 and is used to steal credentials and other sensitive data from victim's machines. The malware targets Windows and Android operating systems and uses a keylogger to steal usernames and passwords and monitors browser and desktop activity. LokiBot can steal credentials from multiple applicatio ...

Alien Trojan Bypasses Two Factor Authentication

A trojan that targets banking apps have been found in Android devices. The trojan is called Alien. Alien bypasses two-factor authentication or 2FA, to steal credentials. Alien targets more than 200 mobile apps, including Bank of America and Microsoft Outlook. The malware has been used to actively target institutions worldwide, including France, Germany, Italy, Spain, and the United States. Researchers think Alien is a copy clone of Cerberus banking malware. ...