How a North Korean Fake IT Worker Tried to Infiltrate Security Awareness Firm KnowBe4
pixely @ pixely @lemmy.world Posts 0Comments 29Joined 2 yr. ago
pixely @ pixely @lemmy.world
Posts
0
Comments
29
Joined
2 yr. ago
Interesting point about the KVM. To make it transparent the KVM would need to report the model of a real monitor in the display EDID data. Also if you’re monitoring the device, which is almost certainly a laptop, it would be suspicious if it was plugged in to a monitor 100% of the time.