What firmware components of a PC are writeable?
What firmware components of a PC are writable? For instance which components have the ability to store rootkits or viruses?
Continue reading What firmware components of a PC are writeable?
Collaborate Disseminate
What firmware components of a PC are writable? For instance which components have the ability to store rootkits or viruses?
Continue reading What firmware components of a PC are writeable?
What componets of a PC do firmware viruses and rootkits infect? Secure boot is supposed to protect you from these types of viruses. Although, it doesn’t protect you against rootkits in UEFI firmware itself? If so is there anything to pr… Continue reading How to protect yourself from firmware viruses
I was wondering if there are any advantages/disadvantages of using Bitlocker/TPM vs. using Veracrypt/TPM as far as vulnerabilities go?
In order to use FDE in Bitlocker, you have to have a Microsoft account, correct? So would it be safe to… Continue reading Differences/vulnerabilities in FDE and TPM using Bitlocker vs Veracrypt? [closed]
Is there a way to disguise your PC characteristics from tools like NMAP and others on the internet? For instance if the OS you are using is Ubuntu is there a way to make it show up as something else. Are firewalls able to block PC’s base… Continue reading How to hide PC characteristics on the internet from tools like NMAP etc
Is there a way to disguise your PC characteristics from tools like NMAP and others on the internet? For instance if the OS you are using is Ubuntu is there a way to make it show up as something else. Are firewalls able to block PC’s base… Continue reading How to hide PC characteristics on the internet from tools like NMAP etc
So what are the advantages of using SiriKali vs. something like Veracrypt. They both essentially do the same thing correct. I assume Veracrypt would be more secure. What are the differences between the two. I know they use different en… Continue reading What are the advantages of using SiriKali vs something like Veracrypt?
Let’s say that I purchased a MFA Yubikey device to secure my accounts. If an attacker wanted to compromise my accounts that are secured with this YubiKey, would this be possible without having the actual device?
First let’s assume the atta… Continue reading How could someone’s account that is secured by MFA Yubikey be compromised?
So I am wondering how I can possibly verify different devices that I purchase. Like when you want to verify a file has not been changed you can verify the checksums. So for example, if I buy a new Android device, a new washer, IoT devices… Continue reading Wondering how to verify devices are still not compromised after reset?
I was thinking of buying a Mooltipass or other hardware key storage and was wondering how this type of device could be compromised, if at all?
Mooltipass also uses FIDO2 so would that mean the need for MFA would not be necessary?
Is it pos… Continue reading How can MFA hardware devices be compromised or attacked by an attacker?
Let’s say I want to set up a few security cameras in the front and back of my house. However, I am going to keep them on a closed network. They will be connected to a router that does not have an internet connection.
I know that someone … Continue reading How can a closed security network be hacked through a connected network?