• Home
  • About Us
  • Features
  • Blog
  • Download
    • Trial License
  • FAQs
  • Contact

Call us at 951-775-7462

info@ezpd.co
EZPD EZPD EZPD EZPD
  • Home
  • About Us
  • Features
  • Blog
  • Download
    • Trial License
  • FAQs
  • Contact

How to defend yourself from the revival of cold boot attacks

Sep 18, 2018 | 0 comments |

Recent reports have shown a decade old hacking technique—the cold boot— is back. There are some notable differences from when the attack was first discovered to today’s version. What is a cold boot attack and are there preventative measures you can take to protect yourself?

What is a Cold Boot Attack?

In 2008, the Princeton group discovered that data stored in the random access memory of a computer is actually preserved over a period after it loses power. As such, the “cold boot” attack is when a hacker takes advantage of an improper shut down of a computer.

A cold boot can happen when someone pulls the plug on a computer and then restarts it. During this short period after power is lost, any information in the random access memory is there for the taking. This is when a hacker uses a tool like an infected USB drive to quickly grab data that was stored in the computer’s memory before the power outage.

Hackers can also extend the period of time the memory cools by leveraging tactic like spraying the memory with an upside down can of liquid air, which releases cold liquid rather than gas.

A cold boot attack can happen on almost any computer.

The Resurgence of Cold Boot Attacks

Recently, security researchers from F Secure discovered a weakness in how computers protect firmware. What they also learned is that this weakness can be exploited using a variation of a cold boot attack.

Essentially, the latest version of the cold boot attack can disable security measures through a computer’s firmware, and allow an attacker to recover sensitive data stored on that computer. A differentiating component of the latest iteration is that an attacker can compromise a laptop that is in sleep mode, potentially lifting sensitive passwords, encryption keys, and other information.

For more technical details, watch the YouTube video from the researchers who discovered the vulnerability.

How to Protect Yourself from Cold Boot Attacks?

Luckily, an attack of this kind is a rather involved process, which makes them more challenging to execute. Additionally, cold boot attacks aren’t too difficult to defend against.

Quick tips for defending against a cold boot attack:

  • One of the most straightforward defenses is to trade sleep mode for hibernation. Hibernation does not leave the same digital traces in memory that sleep does which neutralizes the attack.
  • Make sure your device is as protected as possible with the latest (and best) iterations of antivirus.
  • Set up a strong pre-boot password on your computer adds yet another layer of protection. The more complex the password, the better.

Learn how the strength of EZPD can help protect you from malicious attacks on your computer or network.

0 Comments
0
Share

Leave a Reply

Tell us what you think.
Cancel Reply

Find us on Facebook

Recent Posts

  • What is password spraying and how can your organization defend against it?
  • 4 Essential Cybersecurity Practices for Small Business Owners
  • How to modernize cybersecurity at your organization
  • What is social engineering and how can you protect your organization?
  • How to stay ahead of changing cybercrime patterns

Contact Us

Send us an email and we'll get back to you, asap.

Send Message
Ecwid shopping cart widget

SUBSCRIBE TO OUR MAILING LIST

SB-#2006338

About Us

At iGBu, our goal is to make information security accessible and simple has helped EZPD grow into one of the most unique and important pieces of software on the market.

Get in Touch

  • EZPD Password Generator
  • 387 Magnolia Ave. #103-315 Corona, CA 92879
  • 951-775-7462
  • info@ezpd.co

Business Hours

Mon – Fri: 8:00AM – 5:00PM
Weekends: By appointment only

Stay Connected

SiteLock

© 2021 · EZPD. All Rights Reserved.

  • Home
  • About Us
  • Features
  • Blog
  • Download
    • Trial License
  • FAQs
  • Contact
Prev Next