Skip to main content

Posts

Showing posts from December, 2012

How to Hack a Cisco Phone

Columbia computer scientist Ang Cui helped uncover a weakness in Cisco IP phones that can let a hacker take complete control of them. Read more at  http://spectrum.ieee.org/computing/embedded-systems/cisco-ip-phones-vulnerable

How to hack games from the Windows 8 store

Hi folks, In this article I’ll share the results of ad-hoc security vulnerabilities research I’ve done on windows 8 apps deployment. Specifically, we’ll discuss fundamental design flaws that allow to Reverse Engineer Win8 apps, modification of installed apps and the negative implications on Intellectual Property rights protection, Licensing models and overall PC security. Finally we’ll discuss some creative ideas on how to mitigate these security issues.  Meet the mother-load: C:\Program Files\Applications All Windows 8 applications in the developer preview are installed under the clandestine  C:\Program Files\Applications  location. I will hazard a guess and say that once the Windows App Store goes online it will install all apps under that folder. Currently the folder is an invisible one and cannot be accessed from Windows Explorer user interface on a new Win8 developer preview install. Here’s an example of some of the 29 apps Win8 apps installed on the...