Is there a danger of a data leak if a rotational SAS drive is encrypted after the fact?

If a rotational SAS drive (non-SSD) is encrypted after it has been in use for some time e.g. several years, is there a danger of a data leak? For example, if the drive is encrypted and subsequently formatted e.g. dd, can data be recovered?… Continue reading Is there a danger of a data leak if a rotational SAS drive is encrypted after the fact?

Should breached passwords be changed if 2FA or MFA is enabled across all sites/systems?

If a site has experienced a breach such that usernames and passwords have been leaked, should passwords be changed if 2FA or MFA is enabled?

Before this question is potentially marked as duplicate, the question “Will 2FA pr… Continue reading Should breached passwords be changed if 2FA or MFA is enabled across all sites/systems?

What are the security implications if systemd is not restarted after it has been updated?

My understanding is that systemd is the parent process for all other processes running on Linux.

If systemd has been updated on production devices such as servers and the service is not restarted, what are the security impl… Continue reading What are the security implications if systemd is not restarted after it has been updated?

How reliable is rpm –verify when auditing package integrity and what alternatives are there?

Currently to verify package integrity, the command rpm –verify is run. In reading the rpm manual (http://ftp.rpm.org/max-rpm/s1-rpm-verify-output.html), there is no indication as to the veracity of the verification process.
Continue reading How reliable is rpm –verify when auditing package integrity and what alternatives are there?

What considerations are there for using USB WiFI adapters and how to protect against them?

Often with older machines, the built-in WiFi adapters have failed. These in turn drive a demand to procure USB WiFi adapters since ethernet connectivity is not a choice.

Since the devices will be plugged into a USB port, wh… Continue reading What considerations are there for using USB WiFI adapters and how to protect against them?

How does full disk encryption cater for overprovisoned disk space in flash devices and can this result in data leakage?

My understanding is that flash based devices such as SSDs are over-provisioned and do not advertise the additional blocks of storage available to the operating system. The over-provisioned blocks of storage is to support effe… Continue reading How does full disk encryption cater for overprovisoned disk space in flash devices and can this result in data leakage?