[SANS ISC Diary] Collecting Users Credentials from Locked Devices

I published the following diary on isc.sans.org: “Collecting Users Credentials from Locked Devices“. It’s a fact: When a device can be physically accessed, you may consider it as compromised. And if the device is properly hardened, it’s just a matter of time. The best hacks are the ones which use

[The post [SANS ISC Diary] Collecting Users Credentials from Locked Devices has been first published on /dev/random]

Continue reading [SANS ISC Diary] Collecting Users Credentials from Locked Devices

What are the security risks of using public address schemes for the DHCP of your VPN’d Users?

At the company I work for we recently purchased a network scanning tool to help with asset inventory and overall PC network management. My supervisor, while looking at the different IP address ranges for the various offices, … Continue reading What are the security risks of using public address schemes for the DHCP of your VPN’d Users?