lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AE46D0386422BF4FA18E1A9FB67161A004D082ED@GOAEVS01.abf.ad.airborne.com>
From: BRAD.BEMIS at dhl.com (Brad Bemis)
Subject: CERT Employee Gets Owned

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Nor does it have anything to do with security or even computers.

There is one issue that does relate.  The announcement said that his work
computer was also seized.  That opens questions of what he was being able
to do with his work system, how can other organizations address similar
issues, what other content was stored on his work computer, was there
anything that relates to current security vulnerabilities that are being
worked on with product vendors, how does this impact those vendors and
issues of confidentiality, what else was he using his work computer for...
etc.  These types of issues DO relate to security.     

Thank you for your time and attention,

=======================
Brad Bemis
=======================



-----BEGIN PGP SIGNATURE-----

iQA/AwUBP0uB15DnOfS48mrdEQK5YQCeMZ/9sGVuV6A/4no3WTK8/Nm0WJoAoIzQ
b6LL/jphZMn/NkPcM204BnzO
=cydG
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ