Physical Access

Well if you're going to give a networking security specialist physical access to your computer. It doesn't take long to get in. Of course with the correct tools.


Most users lock their computer screens when they temporarily step away from them. While this seems like a good security measure, it isn’t good enough, a researcher demonstrated this week.

Rob Fuller, principal security engineer at R5 Industries, found out that all it takes to copy an OS account password hash from a locked Windows computer is to plug in a special USB device for a few seconds. The hash can later be cracked or used directly in some network attacks.

For his attack, Fuller used a flash-drive-size computer called USB Armory that costs $155, but the same attack can be pulled off with cheaper devices, like the Hak5 LAN Turtle, which costs $50.

Read more at the above link.


Dells Acquisition COMPLETE

Dell Technologies becomes the world’s largest privately-controlled tech company
Unique corporate structure enables company the flexibility to innovate like a startup and invest in R&D for the long term while offering the trust, service and global scale of a large enterprise
Comprises unique family of businesses including Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware
Technology leader in 20 Gartner Magic Quadrants 
Blends Dell’s go-to-market strength with small business and mid-market customers and EMC’s strength with large enterprises 
New Dell Technologies and Dell EMC branding launched today

AUSTIN, Texas – September 7, 2016 – Dell Technologies today announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion[1] market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. 

Read More on the above link...


Its in every device anyway.

Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target’s mobile phone, was responsible for the intrusions. The NSO Group’s software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the phone user.

Read it all, at the above link.