This "research" paper presents an interesting physical world attack that may be easily deployed by a determined attacker to compromise many high-security access control systems in use today. Although this paper's findings are hardly groundbreaking (and in some ways, are downright obvious), it includes some cool pictures of what should be most certainly taken into account in risk management, secure zone planning, and when drafting operating procedures for high-risk areas.
Author Michal Zalewski is respected in the hacking and security communities for his intelligence, curiosity and creativity...
Author Michal Zalewski is respected in the hacking and security communities for his intelligence, curiosity and creativity...
0 comments:
Post a Comment