What "indicators of compromise" are there that end users can diagnose themselves?

I’m responsible for the IT security of a small (~5 users) office, and I’m preparing training materials for our users.
Obviously, the first step my users should do if anything seems suspicious is to keep calm and contact me. However, if I’m… Continue reading What "indicators of compromise" are there that end users can diagnose themselves?

Can it cost you money to push a number on the phone dial pad during an incoming call? [closed]

Heise online, a well-known German-language technology news site, recently published an article about phone scams.
They write the following about the "Interpol scam" (emphasis mine):

Vermehrt kommt es auch zu Anrufen von BetrĂ¼ger… Continue reading Can it cost you money to push a number on the phone dial pad during an incoming call? [closed]

Mitigating the performance impact of strong hashes with Basic HTTP authentication

I am trying to decide which work factor to use for our hashed passwords, and I am facing the following dilemma. Let me elaborate for a moment.
Basic HTTP authentication works as follows:

The user tries to access a protected resource.
The … Continue reading Mitigating the performance impact of strong hashes with Basic HTTP authentication

Are there advantages to using a hardware token instead of a password on a potentially compromised system?

TLDR: Is there a security benefit to regularly accessing the admin account with a hardware token rather than with a well-protected password?

Long story: I’m both a developer and the system admin of our small network. Thus, on my PC, I usu… Continue reading Are there advantages to using a hardware token instead of a password on a potentially compromised system?

How do open-source projects prevent disclosing a bug while fixing it?

I understand that many open-source projects request vulnerabilities not to be disclosed on their public bug tracker but rather by privately contacting the project’s security team, to prevent disclosing the bug before a fix is available. Th… Continue reading How do open-source projects prevent disclosing a bug while fixing it?

How do I minimize the number of passwords leaked when a PC gets compromized?

For customer support reasons, we need to store passwords to some of our customers’ systems (with their explicit, written permission, of course), as well as, obviously, passwords to some of our own systems. Customer support agents and admin… Continue reading How do I minimize the number of passwords leaked when a PC gets compromized?

Do I need to worry about vulnerabilities that require administrative privileges to exploit?

I am currently evaluating the impact that the recent NUC Firmware Advisory has on our machines.

What confuses me is that fact that those vulerabilities are scored with

a high risk score, but
require(!) administrative privi… Continue reading Do I need to worry about vulnerabilities that require administrative privileges to exploit?