Cold Boot Attack at CanSecWest

After Princeton University researchers showed how they could dig up the contents of a computer's memory just minutes after the machine had been turned off, it was only a matter of time before hackers began showing how this technique, called a cold boot attack, could be used in the real world.

Shop ▾
arrow up Amazon Shop buttons are programmatically attached to all reviews, regardless of products' final review scores. Our parent company, IDG, receives advertisement revenue for shopping activity generated by the links. Because the buttons are attached programmatically, they should not be interpreted as editorial endorsements.

Subscribe to the Security Watch Newsletter