Once an attacker has acquired physical access, it will be quite easy to perform a variety of attacks. Exploiting a machine by acquiring physical access is referred to as the Evil Maid attack in security fraternity. But, a former National Security Agency staffer Patrick Wardle has identified a workable solution to prevent someone accessing a MacBook. Wardle has developed an application that will notify the user as soon as someone tries to exploit his MacBook.
Evil maid and the short-comings of full-disk encryption
TaoSecurity: "Protect the Data" from the Evil Maid
Road warriors, do you know where your notebook is? You better, or Evil Maid may get the best of you and your computer. You may remember Ms. Rutkowska as co-developer of the Blue Pill , a rootkit using virtualization to remain undetectable. Well, Ms. Rutkowska has upset the order of things once again.
Kernel, Hypervisor, Virtualization, Trusted Computing and other system-level security stuff. Do you ever sleep? I love your research and you poke in all of the deep dark corners bringing to light all kinds of evilness
An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it. In a blog post, security analyst Joanna Rutkowska coined the term "Evil Maid Attack"; due to hotel rooms being a common place where devices are left unattended. Defreez, a computer security professional, first mentioned the possibility of an evil maid attack on Android smartphones in