As a private individual, cleanly destroy a large number of paper documents. Are there alternatives to the consumer shredder?

I need to safely dispose of about 30 federal folders. That means 95% of the documents will be shredded and the rest stored. I bought a small shredder for private people (professional shredders are too expensive) and now I see that the effo… Continue reading As a private individual, cleanly destroy a large number of paper documents. Are there alternatives to the consumer shredder?

What is the name of the box that hackers connect to a router in order to spy on all your traffic?

I watched a documentary where hackers entered a victim’s house by pretending to be from the ISP and then connected a box to a router in order to spy on all of the victim’s traffic. Later, the hackers retrieved many passwords, e.g., iCloud … Continue reading What is the name of the box that hackers connect to a router in order to spy on all your traffic?

What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the user to enter). One possibility I can thi… Continue reading What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

Does Windows 10 read/run/care about USB devices plugged in "Lock Screen" mode?

Whenever I leave my computer for the bathroom or anything inside the living space, I press WinKey + L to enter the "Lock Screen" mode. (If I go outside, I turn it off completely.)
Let’s say that somebody is in my house. I lock my… Continue reading Does Windows 10 read/run/care about USB devices plugged in "Lock Screen" mode?

After hardening Windows, Macintosh, and a Linux flavor which is truly toughest?

As a junior security candidate I am under the impression of all these misleading videos and SEO enriched articles full of some of the same copy and pasted top results and really need a better under standing or a foundation for better exper… Continue reading After hardening Windows, Macintosh, and a Linux flavor which is truly toughest?

Allow the use of camera phones in the manufacturing facilities; but then how do I maintain the security of the premises

What are the best practices to be followed to maintain security in the manufacturing site where camera phones are allowed?
I’m working on one of the largest manufacturing facility where few of the R&D/IT/HR team sits in the same shop f… Continue reading Allow the use of camera phones in the manufacturing facilities; but then how do I maintain the security of the premises