Newest Questions
70,156 questions
0
votes
0
answers
8
views
File backup encryption for personal files
I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
0
votes
1
answer
25
views
What can cause my passwords got changed by someone or something else soon after I changed them?
I have been experiencing very strange issues: each day I changed my passwords, the next day when I checked, they would be "wrong", and I had to change them again. This intensively happens on ...
1
vote
1
answer
82
views
Can you bypass PIN requirement of FIDO token protected LUKS device with hex editor?
I noticed that with Linux pam-u2f module whether you are required to input your PIN can be changed by simply editing ~/.config/Yubico/u2f_keys file and either adding +pin to your configuration line or ...
5
votes
1
answer
298
views
What is the difference between contactless Apple Pay and contactless card?
Apple claims that one time token is created. What is the purpose of that token? What happens with that token?
As far as I know when I pay with my physical debit card the information passed the POS ...
0
votes
0
answers
32
views
Wordpress site compromised? [closed]
I'm running a few services for different teams in my organization including a Wordpress site. Today a teamlead messaged me, that none of them is able to log into their accounts anymore.
While ...
0
votes
1
answer
37
views
PCI applicability when only typing cc info into a client's payment system
My company has a small call center. Less than 100 people. Currently we do not do any credit card transactions but are looking to do so in the future.
One potential client has us using their ...
6
votes
3
answers
2k
views
Does an SMS OTP have to be recreated for every message?
I use SMS for MFA (yes I know it's bad, but better than no MFA) in an web application.
On login an OTP is sent to the user via SMS.
This OTP is valid until:
it expires after 10 minutes
it is ...
0
votes
0
answers
18
views
Why is the raw log data parsed by Defender different from what is shown in the Defender console?
How does Defender for Cloud interpret and normalize these logs?
In the Defender console, I see an inbound connection on a DMZ host (acting as an FTP server using vShell), showing Tor IP → internal IP.
...
0
votes
0
answers
41
views
Does qualified electronic signature require a certified middleware
When you interact with QSCD on a token do you need the middleware to be issued by a Trusted Service Provider (TSP), or is middleware just a utility which I can reimplement on another platform?
Does ...
1
vote
0
answers
44
views
How can I restrict IFEO vulnerability?
I have an application, myapplication.exe. Through IFEO registry I can attach a debugger, which can be a malicious piece of software for a attacker.
Only someone having access to Windows registry can ...
0
votes
1
answer
73
views
I inherited an older macbook and want to login but don't know username or password [closed]
I inherited my mom's macbook and want to access it to see if she had any old pictures, recipes, or other files that would be nice to have.
However I don't know her username or password.
Is there any ...
0
votes
0
answers
51
views
What is the appropriate incident-response procedure after a user clicks a phishing link without entering credentials? [duplicate]
A user accidentally clicked a link in a phishing email.
The link led to what appeared to be an online video-course/tutorial site. The user did not enter any credentials, download any files, or ...
-1
votes
0
answers
29
views
I need to implement Suricata [closed]
I am working on my graduation project, and I need to implement Suricata as an IDS/IPS honeypot on EVE-NG. How can I connect it to the routers and switches?
0
votes
1
answer
85
views
How I can ensure that I have enough entropy in a base64 encoded byte string?
In php I am generating a unique random token used as a code and Index for password resets:
declare(strict_types=1);
namespace App\Domain\Helper;
use Ramsey\Uuid\Uuid;
use Random\RandomException;
...
0
votes
0
answers
4
views
How to analyse Android mobile memory? [migrated]
Is there any method to forensically analyse Android mobile memory without rooting the phone. I want to capture malware in my Android phone.