In previous posts, I described how I gained access to the data center area and then the data center proper.
I had bypassed door #1 and door #2.
My new colleagues were not happy.
In previous posts, I described how I gained access to the data center area and then the data center proper.
I had bypassed door #1 and door #2.
My new colleagues were not happy.
Filed under Case Files, Security, Security Scout
I found some really pathetic password help pages on a company’s intranet while I was there visiting.
This is a large company that most people would recognize, and it is subject to plenty of government regulations. Overall, I’ve heard the security is pretty tight, but since I’ve never worked there, I can’t speak from experience. Except, that is, the experience I mentioned in an earlier post, Randomly Generate Weak Passwords. Perhaps all their security is what Bruce Schneier likes to call “security theater.”
Filed under Audit, Humor/Irony, Security, Security Scout
Lenny Zeltser suggest 5 steps that mid-market organizations can take down the security path:
Filed under Security
Out-of-Office Reply Tells All
I checked my personal email account and found I had 3 out-of-office replies from people who obviously belonged to the same organization. However, I had never emailed any of them.
At first I thought they were some kind of a malware emails, but they were text only and contained no links. So I just left them in my email box and wondered about them every time I saw them. Then I figured it out.
Continue reading →
Share this:
Like this:
4 Comments
Filed under Blogging, Security, Security Scout
Tagged as anonymous, Blogging, comments, email, insider, ooo, out of office, reply, spammer