Solved

Secure Dongle X

Posted on 2013-05-16
5
919 Views
Last Modified: 2013-05-22
Hi there

We recently found a "Secure Dongle X" in the back of a clients PC. Now they do not have any software that would require a dongle and we have never seen it before.

Could it be used for anything untoward? Hacking etc?

They do have concerns regarding one member of staff, this member of staff and her family also clean the building at weekends when no one else is about, so have plenty of opportunity to "mess around" without being seen.
0
Comment
Question by:diles
  • 3
  • 2
5 Comments
 
LVL 8

Expert Comment

by:teomcam
ID: 39172271
Some security equipment requires secure dongle. Also please check following link
http://www.securemetric.com/securedongle-x.php
0
 

Author Comment

by:diles
ID: 39172707
I'm aware of that but they don't have any secure software that would require one. They did use to use a voicemail system but that is long gone and i do not recall that dongle being there the last time i was working on that pc.
0
 
LVL 8

Expert Comment

by:teomcam
ID: 39172850
That's weird. Those dongles not used for hacking purpose but could you check more closely if the dongle have been tampered or not? Possibly it might be some other tool covered with Secure Dongle X cover!
If that is very critical machine that might be a kind of transmission dongle whihc delivering the data somewhere else.
0
 

Accepted Solution

by:
diles earned 0 total points
ID: 39174488
Thanks for all your help. Dongle removed and keeped in safe place. All seems to be working ok.
0
 

Author Closing Comment

by:diles
ID: 39186858
No good answer as this is unusual so we will have to see what happens.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now