Security researchers have busted the encryption in several popular Crucial and Samsung SSDs

Security researchers have busted the encryption in several popular Crucial and Samsung SSDs

By Zack Whittaker

Researchers at Radboud University have found critical security flaws in several popular Crucial and Samsung solid state drives (SSDs), which they say can be easily exploited to recover encrypted data without knowing the password.

The researchers, who detailed their findings in a new paper out Monday, reverse engineered the firmware of several drives to find a “pattern of critical issues” across the device makers.

In the case of one drive, the master password used to decrypt the drive’s data was just an empty string and could be easily exploiting by flipping a single bit in the drive’s memory. Another drive could be unlocked with “any password” by crippling the drive’s password validation checks.

That wouldn’t be much of a problem if an affected drive also used software encryption to secure its data. But the researchers found that in the case of Windows computers, the default policy for BitLocker’s software-based drive encryption is to trust an encryption-supported drive — and therefore rely entirely on a device’s hardware encryption to protect the data. Yet, as the researchers found, if the hardware encryption is buggy, BitLocker isn’t doing much to prevent data theft.

In other words, users “should not rely solely on hardware encryption as offered …read more

Source:: TechCrunch Gadgets

Yub nub! Students dress a bipedal robot up like an AT-ST Previous post Yub nub! Students dress a bipedal robot up like an AT-ST Subterranean drone mapping startup Emesent raises $2.5M to autonomously delve the deep Next post Subterranean drone mapping startup Emesent raises $2.5M to autonomously delve the deep