I published the following diary on isc.sans.org: “Collecting Users Credentials from Locked Devices“.
It’s a fact: When a device can be physically accessed, you may consider it as compromised. And if the device is properly hardened, it’s just a matter of time. The best hacks are the ones which use a feature or the way the computer is supposed to work. To illustrate this, let’s review an interesting blog post published yesterday. It demonstrates how easy it is to steal credentials from a locked computer… [Read more]
[The post [SANS ISC Diary] Collecting Users Credentials from Locked Devices has been first published on /dev/random]