If you’re planning to run your website on a public facing PC or tablet, it’s not hard to imagine what could go wrong if a malicious user were to hijack control of your web browser. KioskSimple is the kiosk browser lockdown software designed specifically to secure your web browser.
If you’re developing a kiosk application you’ve probably wondered what technology you should use.
The two most common options are creating a website or a native application. In this article we’ll focus on the benefits of creating a native kiosk application.
Our developers have been creating large-scale, unattended payment applications for many years now and the following are the reasons we choose to develop our kiosk applications as a native application (typically in .NET WPF).
A common question I hear from new clients is “why would I want to use kiosk software when I can just use kiosk mode in Windows 8 (aka Assigned Access)?”
This is a fair question, so I’m going to explain the limitations of Windows Kiosk Mode and when there is a need for kiosk software.
The short answer is that kiosk software makes up for the short comings in Windows Kiosk Mode and adds an additional layer of security and ease of use to get you up and running quickly without all the headaches.
Our kiosk software is designed to be so simple that no nerd degree is required.
You’re probably reading this article because you’ve decided to create a website which needs to accept cash payments, but also needs to dispense change in whole bills. Maybe your website is running on a self-service kiosk or unattended payment solution.
It’s been an awesome 2015 for our team and we’re looking forward to a kick-ass 2015. This year we had a great launch of KioskSimple, our flagship kiosk software product. Below are just a few of our plans for the New Year.
KioskSimple support for Awesomium (for those who prefer the Google Chrome and Safari browsers)
I’ve asked our kiosk application developers to come up with their best ideas on how they would go about hacking a kiosk application and compiled a list for you reading pleasure. This is not intended to be a list of known exploits for any specific kiosk application, but rather a list of things our kiosk application developers would try if we were so inclined to hack a kiosk application. We choose to focus on hacking the kiosk application itself not the hardware. So brilliant ideas like tying the kiosk to the bumper of your pickup truck will not be included. Disclaimer, this article is for educational purposes only to help you improve the security of your kiosk applications so don’t try this on a kiosk without permission. Continue reading “A Guide to Hacking Kiosk Applications”
If your kiosks have any of their USB ports exposed then watch out, because your kiosks are vulnerable to a recently discovered security vulnerability. According to a recent USB security article in Wired the security researchers Karsten Nohl and Jakob Lell have demonstrated how their malware called BadUSB “can be installed on a USB device and used to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic.” Continue reading “Protecting Your Kiosks From BadUSB Malware”