Windows 8 plug and play on Macbook Pro

Just got my hands on a “broken” Macbook Pro. It seemed to be a bug with the installed hard drive. So in order to verify this I inserted an old hard drive I had laying around. It turned out to have Windows 8 installed from the last time I was playing around with it on my old (7 years) FujitsuSiemens.

wpid-snapchat-20140805095348.jpgGuess what happened when I booted the Mac. The MS Windows logo appeared, telling me it was preparing components. And after two minutes, Windows was running smooth on this old Macbook Pro. That’s what I call plug’n’play

Cyber Attack Map

ipvikingNorse has made an attack-map showing live attacks with some delay. I think it is a nice illustration of the frequency of various cyber attacks. However, I am not sure for what other reason than awareness it is useful for. At the time I took the screenshot, it was happening quite a lot all over the place… I wonder how precise such a tool can be.

 

 

NSA of Things using Hardware Implants, Exploits, etc…

What to expect from a standard USB cable?

usb

Probably not surprising, but check out this video from Chaos Communication Congress and the presentation “To Protect and Infect” by Jacob Applebaum to learn more about the speculations of NSAs hardware implants in USB cables, exploits, malware etc. for surveillance, namely: Somberknave, Totechaser, Iratemonk, Monkeycalendar (with references to Karsten Nohls work), Bulldozer, Iron Chef, Cottonmouth, Howlermonkey, CTX4000 (ragemaster RF-flooding) and more.

More about the actual documents presented you find here at Leaksource.